<?xml version="1.0" encoding="us-ascii"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

<!ENTITY SELF "[RFCXXXX]">
]>


<rfc ipr="trust200902" docName="draft-li-dart-protocol-00" category="exp" submissionType="independent" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="DART Protocol">DART: Domain-Aware Routing Technology Protocol</title>

    <author initials="S." surname="Li" fullname="Shi Li">
      <organization></organization>
      <address>
        <postal>
          <city>Shanghai</city>
          <country>China</country>
        </postal>
        <email>lishi.china@qq.com</email>
      </address>
    </author>

    <date year="2025" month="September" day="11"/>

    <area>Internet</area>
    <workgroup>Independent Submission</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 103?>

<t>This document proposes a new addressing and routing protocol named Domain-Aware Routing Technology (DART). Built upon the existing IP network architecture, DART introduces a fully qualified domain name (FQDN)-centric addressing model to address the global exhaustion of IPv4 addresses and significantly enhance the scalability and evolvability of the Internet.</t>

<t>DART supports a name-based communication model and can be encapsulated over either IPv4 or IPv6 networks. This enables high compatibility with existing infrastructures and supports deployment and interoperability across heterogeneous protocol environments. Its addressing logic and architectural design exhibit the following characteristics:</t>

<t><list style="symbols">
  <t>In terms of scalability<br />
DART localizes the IPv4 address space to individual Domain Names (DNS) domains, granting each domain an independent full address pool. This enables unlimited address reuse, greatly reduces global routing table growth, and promotes a more structured and aggregatable forwarding hierarchy.</t>
  <t>In terms of evolvability<br />
DART shifts the addressing paradigm from &quot;IP-based location&quot; to &quot;name-based location&quot;, laying the foundation for a unified, name-driven networking model. It holds potential to redefine the semantics of network addressing and routing architecture.</t>
</list></t>

<t>DART is designed for incremental deployment. Network operators can derive a subdomain within the DNS system to serve as a DART domain, immediately gaining access to a dedicated 2^32-sized address space. Each DART domain may further delegate subdomains, forming a theoretically infinite, hierarchical, and scalable global addressing system.</t>

<t>Deployment requires only the installation of DART-capable gateways at the boundaries between DART domains and traditional networks, or between different DART domains, to enable protocol interoperability and cross-domain forwarding. Internal network devices and endpoints within DART domains may continue operating under the existing IP stack without immediate modification. In particular, legacy IPv4-only devices located behind an edge DART gateway can seamlessly connect to the DART network via the <strong>NAT-DART-4</strong> mechanism. New devices may progressively evolve toward native DART support, enabling direct, end-to-end, name-based communication.</t>

<t>A working prototype of the DART protocol has been independently developed and deployed by the author. It is publicly accessible at<br />
http://dart-proto.cn</t>



    </abstract>



  </front>

  <middle>


<?line 124?>

<section anchor="problems"><name>Introduction</name>

<t>With the explosive growth of global Internet-connected devices, the traditional IPv4 <xref target="RFC791"/> address space has long been insufficient to meet the ever-increasing demand for connectivity. Although IPv6 offers a theoretically limitless address capacity, its deployment has been persistently hindered by various practical factors, including high upgrade costs, complex compatibility issues, and unclear operational incentives. As a result, most networks continue to rely on increasingly intricate systems of Network Address Translation (NAT <xref target="RFC3022"/>) and private address mappings to maintain functionality.</t>

<t>To address this dilemma, <strong>Domain-Aware Routing Technology (DART)</strong> emerges as a solution. DART is a communication protocol designed to provide <strong>an effectively unlimited address space</strong> while remaining <strong>highly compatible with existing networks</strong>. To achieve this goal, DART introduces a Fully Qualified Domain Name (FQDN <xref target="RFC1034"/><xref target="RFC1035"/>)-based addressing model and is engineered to be encapsulated within either IPv4 or IPv6 <xref target="RFC8200"/> networks.</t>

<t>DART maintains full compatibility with IPv4 and can be deployed without requiring any modifications to existing endpoint devices. At the same time, DART natively supports IPv6, enabling operation over IPv6-only networks and facilitating seamless interoperability between IPv4 and IPv6 without the need for dual-stack architectures or complex address translation mechanisms.</t>

<t>By integrating DNS into the core of its addressing architecture, DART establishes a name-based routing model. Through virtual address mapping and lightweight encapsulation mechanisms, DART enables an abstract upgrade of the Internet&#39;s addressing semantics within the current network infrastructure. Whether deployed in home, enterprise, or carrier networks, DART can be integrated into the existing Internet at minimal cost, supporting incremental evolution and expanding the global addressable space without requiring architectural overhaul - thereby laying a sustainable technical foundation for the next-generation Internet <xref target="RFC1034"/><xref target="RFC1035"/><xref target="RFC2181"/>.</t>

<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;, &quot;SHOULD&quot;, &quot;SHOULD NOT&quot;, &quot;RECOMMENDED&quot;, &quot;NOT RECOMMENDED&quot;, &quot;MAY&quot;, and &quot;OPTIONAL&quot; in this document are to be interpreted as described in BCP 14 <xref target="RFC2119"/><xref target="RFC8174"/> when, and only when, they appear in all capitals, as shown here.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t><list style="symbols">
  <t>DART<br />
Domain-Aware Routing Technology. A protocol that introduces a domain name-based addressing and encapsulation mechanism on top of the existing IP network, enabling scalable and highly compatible global communication.</t>
  <t>DART Domain<br />
A logical addressing domain defined by a DNS subdomain (e.g., dart.example.com). Each DART domain owns an independent IPv4 or IPv6 address space, which is used by devices within the domain.</t>
  <t>DART Address<br />
Essentially represented by a globally unique Fully Qualified Domain Name (FQDN), indicating the identity and location of a communication endpoint. During actual communication, it is mapped to an IP address allocated within the corresponding DART domain. The IP address itself is not globally unique.</t>
  <t>DART Encapsulation<br />
DART packets use DART addresses as both source and destination identifiers and are encapsulated in UDP datagrams for transmission over existing IP networks. The encapsulated payload supports standard IP packet structures.</t>
  <t>NAT-DART-4 Translation<br />
A gateway mechanism that enables legacy IPv4-only hosts to establish peer-to-peer communication via the DART network. The edge DART gateway performs transparent translation between DART packets and IPv4 packets, allowing seamless compatibility <xref target="RFC2663"/><xref target="RFC4787"/>.</t>
  <t>DART Gateway<br />
A forwarding device deployed at the boundary of a DART domain, responsible for encapsulating and decapsulating DART packets, performing route selection, and interworking with legacy IPv4/IPv6 networks.</t>
  <t>Virtual Address Mapping<br />
When a local host queries domain names within a remote DART gateway&#39;s subdomain, all such names resolve to the same external IP address of the remote DART gateway. In this case, IPv4-only hosts behind the local DART gateway are unable to distinguish between different hosts within the remote subdomain. To address this, the local DART gateway maps each remote domain name to a distinct virtual address, allowing internal IPv4-only hosts to differentiate between target hosts and maintain consistent mappings throughout the session. This mechanism is essential for enabling IPv4-only hosts to function as DART-capable endpoints.</t>
  <t>DART-capable Public Server<br />
A server deployed on the public Internet, primarily providing web or application services, usually associated with a stable domain name and operating continuously online.</t>
  <t>DART-capable End Device<br />
Devices intended for personal or enterprise use, such as PCs, mobile phones, and IoT devices.</t>
</list></t>

</section>
<section anchor="design-goals"><name>Design Goals</name>

<t>Domain Aware Routing Technology (DART) aims to provide a sustainable and scalable addressing and forwarding architecture for the future Internet, addressing fundamental issues such as IPv4 address exhaustion, protocol fragmentation, and upgrade difficulties. The design emphasizes incremental deployment without disrupting existing network operations, guiding the global network ecosystem toward a unified, efficient, and sustainable model <xref target="RFC8504"/><xref target="RFC4864"/>.</t>

<t>The core design goals include:</t>

<t><list style="symbols">
  <t>Infinite Addressability<br />
DART utilizes Fully Qualified Domain Names (FQDNs) as principal identifiers, freeing addressing from fixed-length numeric schemes and inherently supporting unlimited scalability.</t>
  <t>Full IPv4 Compatibility<br />
The DART protocol operates over standard IPv4 networks without requiring any modifications to the IPv4 protocol stack, existing endpoints, or network devices, making it well-suited for deployment on widely deployed infrastructures.</t>
  <t>Native IPv6 Compatibility<br />
DART also supports encapsulation over IPv6 networks and can operate in IPv6-only environments, providing equivalent addressing and forwarding capabilities in pure IPv6 deployments.</t>
  <t>Seamless IPv4 and IPv6 Interoperability<br />
Through gateway mechanisms, DART enables transparent communication between IPv4-only and IPv6-only hosts without the need for dual-stack deployments or complex address translation schemes such as NAT64.</t>
  <t>Deep Integration with DNS<br />
DNS serves as the control plane core in DART, responsible for identity resolution and virtual address assignment, thereby supporting dynamic mapping, mobility, and service-level addressing.</t>
  <t>Support for Incremental Deployment<br />
DART can be deployed across residential, enterprise, and operator networks with strong backward compatibility and edge-introduction capabilities, allowing phased adoption without impacting existing services.</t>
  <t>Load Balancing and Mobility Support Outlook<br />
By returning multiple IP addresses via DNS, DART inherently supports load balancing. Although mobility mechanisms remain under active research, dynamic DNS updates and routing optimizations are expected to enable effective mobility support for moving nodes.</t>
</list></t>

<t>Together, these goals form the foundation of the DART protocol, enabling compatibility with existing network architectures while providing extensibility for future growth-not as a disruptive replacement, but as an evolutionary enhancement aligned with emerging network trends.</t>

</section>
<section anchor="protocol-overview"><name>Protocol Overview</name>

<t>DART (Domain Aware Routing Technology) is a standalone network-layer protocol that enables packet forwarding based on Fully Qualified Domain Names (FQDNs) rather than fixed-length numeric addresses. Unlike IPv4 <xref target="RFC791"/> and IPv6 <xref target="RFC8200"/>, which rely on prefix-based routing of 32-bit or 128-bit addresses, DART uses human-readable, hierarchical domain names as primary network identifiers.</t>

<t>DART is not an extension of IP, but an alternate network layer that operates encapsulated within IP packets. This structural encapsulation ensures compatibility with existing infrastructure while enabling DNS-driven routing. Typically, DART payloads are embedded in User Datagram Protocol (UDP <xref target="RFC768"/>) packets using a dedicated port (e.g., 0xDA27), allowing them to traverse NAT gateways and be transmitted over both IPv4 and IPv6 networks.</t>

<t>Routing decisions in DART networks are based on FQDN semantics, with DNS serving as the authoritative system for both name resolution and capability discovery (e.g., whether a target host supports DART). DART-capable nodes dynamically determine whether to initiate DART-based communication based on DNS responses.</t>

<t>DART gateways perform protocol translation for legacy IP-only hosts, enabling incremental adoption across heterogeneous networks. The design prioritizes evolutionary deployment without requiring changes to legacy endpoints, while offering a unified and extensible framework for next-generation networking.</t>

<t>This document treats DART as a first-class network protocol, capable of operating alongside traditional IP stacks. The following sections define its packet format, addressing model, routing mechanisms, and deployment strategies.</t>

</section>
<section anchor="packet-format"><name>Packet Format</name>

<t>The DART protocol defines a lightweight packet header that carries identification information for the destination and source hosts, and guides packet forwarding across different DART domains. This header is inserted between the IP layer and the transport layer, positioning DART as a protocol operating at a &quot;second network layer.&quot; It does not interfere with the existing IP header structure and, when necessary, provides virtual addressing support for IPv4-only hosts.</t>

<section anchor="header-structure"><name>Header Structure</name>

<t>The DART packet header is structured as follows:</t>

<figure title="DART Packet Header Structure" anchor="_figure-header-structure"><artwork><![CDATA[
0                   1                   2                   3  
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|    Version    |     Proto     |    DstLen     |    SrcLen     |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                Destination FQDN-ID (variable length)          ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                                                               |
~                   Source FQDN-ID (variable length)            ~
|                                                               |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

]]></artwork></figure>

<t><list style="symbols">
  <t>Version (8 bits)<br />
Indicates the version of the DART protocol. The current version is 1. Future versions may be used to extend the field structure or introduce new addressing mechanisms.</t>
  <t>Proto (8 bits)<br />
Specifies the upper-layer protocol type, using the same values as the IP protocol field (e.g., 6 for TCP, 17 for UDP, 1 for ICMP). When encapsulating a packet in DART, the Protocol field in the outer IP header should be adjusted accordingly (e.g., set to &quot;UDP&quot;, with the UDP destination port set to 0xDA27), and the original protocol number should be copied into this field.</t>
  <t>DstLen (8 bits)<br />
Length of the Destination FQDN-ID, in bytes.</t>
  <t>SrcLen (8 bits)<br />
Length of the Source FQDN-ID, in bytes.</t>
  <t>Destination FQDN-ID (variable length)<br />
The Fully Qualified Domain Name of the destination host, e.g., dart-host.example.com. It serves as the primary routing identifier of the DART packet, and the receiver must be able to correctly parse its semantic structure.</t>
  <t>Source FQDN-ID (variable length)<br />
The Fully Qualified Domain Name of the source host. This field can be used for reverse routing of response paths, policy control, and other purposes.<br />
If the length of the Source FQDN-ID field is zero, it indicates that the packet is anonymous or unidirectional. In this case, the receiver should not expect a source identifier and should not generate a response to this packet. This design is suitable for unidirectional notifications, broadcast or multicast packets, and privacy-protecting communication scenarios where the sender does not wish to reveal its identity.</t>
</list></t>

</section>
<section anchor="encoding-and-alignment"><name>Encoding and Alignment</name>
<t><list style="symbols">
  <t>All fields are encoded in network byte order (big-endian);</t>
  <t>FQDN-ID fields are represented in UTF-8 encoding, not null-terminated and not aligned to fixed boundaries;</t>
  <t>During decapsulation, the positions of the FQDN fields must be determined precisely based on the values of DstLen and SrcLen.</t>
</list></t>

</section>
<section anchor="header-insertion-position"><name>Header Insertion Position</name>
<t>DART packets are not defined as native IP-layer protocols. Instead, they are encapsulated within the payload of UDP datagrams. A fixed UDP destination port (recommended: 55847 / 0xDA27) is used to distinguish DART packets and facilitate their processing. The encapsulation stack is illustrated as follows:</t>

<texttable title="Example of DART Header Insertion Position" anchor="tab-dart-header">
      <ttcol align='center'>Layer</ttcol>
      <ttcol align='left'>Remarks</ttcol>
      <c>Ethernet</c>
      <c>&#160;</c>
      <c>IP</c>
      <c>v4/v6</c>
      <c>UDP</c>
      <c>DstPort=55847</c>
      <c>DART</c>
      <c>&#160;</c>
      <c>Upper-layer Protocol</c>
      <c>(e.g., TCP/UDP/ICMP)</c>
      <c>Payload</c>
      <c>&#160;</c>
</texttable>

<t>Encapsulation Details:</t>

<t><list style="symbols">
  <t>UDP Source Port: May be dynamically allocated (e.g., for session tracking);</t>
  <t>UDP Destination Port: Recommended to be statically set to 55847 (decimal), indicating a DART payload;</t>
  <t>UDP Length: Covers both the DART header and upper-layer protocol data;</t>
  <t>UDP Checksum: Optional, but recommended for integrity checking.</t>
</list></t>

<t>NAT Compatibility:</t>

<t>Since DART packets appear as regular UDP traffic on the wire, they inherit the following advantages:</t>

<t><list style="symbols">
  <t>Full compatibility with consumer and enterprise-grade NATs;</t>
  <t>No reliance on IP options or Application Layer Gateways (ALGs);</t>
  <t>Can be managed by existing firewalls and access control policies based on UDP port;</t>
  <t>Enables NAT traversal techniques such as UDP hole punching, keep-alive, and reachability testing (While the</t>
</list></t>

<t>DART protocol aims to eliminate the necessity of NAT gateways, it remains compatible with them, though the use of overly complex NAT-related techniques is not encouraged).</t>

</section>
<section anchor="example"><name>Example</name>
<t>Assume that the client client.dart.cn initiates a DART connection to the server server.example.com. The DART header fields are as follows:</t>

<texttable title="DART Header Example" anchor="tab-dart-header-example">
      <ttcol align='left'>Field  Name</ttcol>
      <ttcol align='center'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <c>Version</c>
      <c>1</c>
      <c>Protocol version</c>
      <c>Proto</c>
      <c>6</c>
      <c>Upper-layer protocol (6 = TCP)</c>
      <c>DstLen</c>
      <c>18</c>
      <c>Byte length of the destination FQDN</c>
      <c>SrcLen</c>
      <c>14</c>
      <c>Byte length of the source FQDN</c>
      <c>Dst FQDN-ID</c>
      <c>&quot;server.example.com&quot;</c>
      <c>Destination host name, encoded in UTF-8</c>
      <c>Src FQDN-ID</c>
      <c>&quot;client.dart.cn&quot;</c>
      <c>Source host name, encoded in UTF-8</c>
</texttable>

</section>
</section>
<section anchor="dart-addressing-and-routing-model"><name>DART Addressing and Routing Model</name>

<t>DART replaces the reliance on IP addresses as globally unique host identifiers with an addressing architecture based on Fully Qualified Domain Names (FQDNs). It introduces a domain-based hierarchical routing model, enabling wide-area coverage, virtually unlimited addressability, and backward compatibility with IPv4-only hosts through the use of virtual addresses, DNS integration, and cooperation with DART gateways.</t>

<section anchor="fqdn-as-address"><name>FQDN as Address</name>
<t>In the DART protocol, each host uses its Fully Qualified Domain Name (FQDN) as its logical address (FQDN-ID). This address is transmitted in clear text within packets and serves as the primary basis for forwarding decisions. This model offers the following advantages:</t>

<t><list style="symbols">
  <t>The address space is theoretically unlimited, constrained only by the domain name system.</t>
  <t>It can intuitively reflect the network&#39;s organizational structure and physical topology.</t>
  <t>It supports flexible address mapping, making scenarios such as load balancing and host mobility feasible-provided that DART gateways maintain consistent mappings.</t>
  <t>Effectively mitigates common problems of address conflicts and identity ambiguity typically encountered in NAT environments.</t>
</list></t>

</section>
<section anchor="inter-domain-routing-model"><name>Inter-Domain Routing Model</name>
<t>The DART network adopts a hierarchical and distributed routing architecture based on domain names, with two core components: the DNS system and the DART Gateway:</t>

<t><list style="symbols">
  <t>The DNS system constitutes the control plane of DART, responsible for domain name allocation, resolution, address mapping, and the dissemination and negotiation of control information. It determines the logical structure of communication paths.</t>
  <t>The DART Gateway is responsible for the data plane, handling data encapsulation and decapsulation, routing decisions, and protocol translation at domain boundaries.</t>
</list></t>

<t>This design follows the established principle of control plane and data plane separation in modern Internet architecture, enabling DART to achieve high scalability and flexible deployment. Inter-domain communication paths are resolved hierarchically through DNS, while actual packet forwarding is carried out by DART gateways at domain boundaries, thereby constructing a logically autonomous and structurally clear model of inter-domain connectivity.</t>

<t>It is worth noting that the host naming mechanism in DART networks is fully compatible with the existing DHCP+DNS infrastructure. In current local network practices, hosts typically submit their hostname during DHCP requests. The DHCP server assigns an IP address and can register the hostname-to-IP mapping in the DNS system using Dynamic DNS (DDNS) <xref target="RFC2136"/>.</t>

<t>In future scenarios where hosts natively support the DART protocol stack, the DHCP server can centrally assign hostnames that conform to DART naming conventions, and DHCP clients can configure their local hostname accordingly. This ensures consistent and centrally managed naming within the network.
Even in transitional phases where end hosts are not yet DART-aware, DHCP servers can enforce uniqueness by rejecting duplicate hostnames or appending disambiguating suffixes. This mechanism provides a practical and incremental deployment path for DART, allowing it to smoothly integrate with existing network environments.</t>

<section anchor="domain-structure-and-gateway-interfaces"><name>Domain Structure and Gateway Interfaces</name>

<t>The DART network is built upon the hierarchical logic of the DNS naming system, in which each domain can be further divided into child domains, forming a multi-level logical naming tree. Correspondingly, DART Gateways serve as the connective backbone of this tree, responsible for cross-domain packet forwarding and control-plane signaling.</t>

<t>A typical DART Gateway includes the following interface structure:</t>

<t><list style="symbols">
  <t>Parent domain interface (upstream): Used to connect to the parent DART domain. It typically handles access to the DNS control plane and the forwarding of upstream traffic. This interface may use various connection types, including direct physical links or indirect logical paths via intermediate networks (i.e., &quot;third-party relay paths&quot;).</t>
  <t>Child domain interface (downstream): Used to connect to the child domains managed by the gateway. Each child domain is treated as a logical DART region. The downstream interface handles local DNS forwarding, virtual address allocation, DART encapsulation, and related tasks.</t>
</list></t>

<t>The domain relationship of a DART Gateway must conform to the following structural rules:</t>

<t><list style="symbols">
  <t>Single parent domain: Each DART Gateway must belong to exactly one parent domain to maintain a hierarchical directed tree structure;</t>
  <t>Support for multiple child domains: A DART Gateway may manage one or more child domains, which together form its downstream logical namespace;</t>
  <t>Multiple interfaces to the same domain: A DART Gateway may connect to the same domain (either parent or child) via multiple interfaces to support redundancy, load balancing, path optimization, or lateral connectivity between sibling gateways;</t>
  <t>Intra-domain routing is delegated to the IP layer: For multiple interfaces connected to the same domain, routing decisions and path convergence are handled by standard IP-layer dynamic routing protocols (e.g., OSPF <xref target="RFC2328"/>, BGP <xref target="RFC4271"/>). The DART layer does not interfere with intra-domain routing.</t>
</list></t>

<t>This interface model has the following properties:</t>

<t><list style="symbols">
  <t>Scalable hierarchical extension<br />
Each child domain may recursively deploy its own DART Gateways and form deeper hierarchical structures;</t>
  <t>Explicit domain boundaries<br />
The DART Gateway acts as the sole ingress/egress point for domain-level communication, supporting policy enforcement and traffic management;</t>
  <t>Support for incremental deployment<br />
DART support can be gradually introduced at any layer without disrupting existing networks.</t>
</list></t>

<t>Through this structure, the DART network enables a flexible, multi-level architecture that provides a well-organized foundation for FQDN-based addressing and routing.</t>

<t>In practical deployments, it is possible for DART Gateway interconnections to span multiple hierarchical levels without a common parent domain (e.g., a capital node in a small country may connect to a neighboring border city in a large country instead of the distant capital). Such scenarios go beyond the expressive power of static hierarchical domain models. It is therefore recommended that industry experts consider adapting mature dynamic routing protocols from the IP layer to design a dynamic routing mechanism for the DART layer, enabling flexible routing across domain boundaries and hierarchy levels. This document does not delve into protocol design details, which are left for future research by specialists in the field.</t>

<figure title="A Typical DART Inter-Domain Hierarchy" anchor="fig-dart-header"><artwork><![CDATA[
              +------------------+
              |   Parent Domain  |
              +------------------+
                       ^
                       |
              [Upstream Interface]
                       |
        +----------------------------+
        |       DART Gateway         | <-- Lateral Link --> Other DART
        +----------------------------+                       Gateway
          ^                        ^
[Downstream Interface]    [Downstream Interface]
          |                        |
  +----------------+       +----------------+
  | Child Domain A |       | Child Domain B |
  +----------------+       +----------------+
]]></artwork></figure>

<t>Notes:</t>

<t><list style="symbols">
  <t>The parent domain is shown above, connected via the upstream interface;</t>
  <t>Two child domains are shown below, each connected via a downstream interface;</t>
  <t>The lateral link indicates peer-level connectivity, logically still part of the parent domain;</t>
  <t>Interface roles are annotated with bracketed labels;</t>
  <t>This structure reflects the DART model of &quot;one parent, multiple children, and multi-interface support.&quot;</t>
</list></t>

</section>
<section anchor="darts-requirements-and-suggestions-for-the-dns-system"><name>DART&#39;s Requirements and Suggestions for the DNS System</name>
<t>The DART protocol relies on FQDN-based addressing and uses the DNS system as its control plane. Domain-level routing, subdomain delegation, and host reachability all depend on DNS operations. As a result, DART places higher demands on DNS functionality, extensibility, and autonomy. The key requirements include:</t>

<t><list style="symbols">
  <t>Dynamic Subdomain Delegation<br />
Each DART subdomain must register itself as an authoritative server under its parent domain. In many scenarios-especially for edge DART gateways that dynamically generate subdomains-there must be a mechanism to dynamically register or update NS and A/AAAA records within the DNS system.</t>
  <t>Precise FQDN Resolution<br />
As all packet forwarding decisions in a DART network are based on FQDN, DNS resolution must be complete, accurate, and consistent. The system must support fast TTL refresh, coherent caching strategies, and avoidance of partial or ambiguous resolution paths.</t>
  <t>Indication of DART-Ready Hosts<br />
To distinguish DART-ready hosts from IPv4-only ones, the DNS system may employ special markers, such as CNAME prefixes (e.g., dart-host.) or dedicated TXT records. These indicators help DART senders determine whether to encapsulate outgoing packets using the DART protocol.</t>
  <t>Enhanced DNS Security<br />
Since DART forwarding depends entirely on DNS results, the authenticity and integrity of DNS records are critical. Security measures such as DNSSEC are strongly recommended to prevent cache poisoning or redirection attacks that may compromise routing.</t>
</list></t>

<t>To fulfill these requirements, modern DNS software stacks can be extended via plugins, APIs, or integration with SDN controllers. Popular DNS platforms like BIND, PowerDNS, and CoreDNS offer sufficient programmability to serve as a foundation for early-stage DART trials.</t>

<t>In conclusion, the DNS system is the cornerstone of DART&#39;s control plane. Its completeness, performance, and adaptability will directly impact the scalability and manageability of DART networks. Future standardization work may consider extending the DNS protocol or defining new implementation guidelines to support DART&#39;s dynamic, secure, and FQDN-based addressing model.</t>

</section>
<section anchor="routing-and-forwarding"><name>Routing and Forwarding</name>
<t>DART is a parallel network layer protocol encapsulated above the IP layer. Due to the design principle that each DART domain owns an independent IPv4 address space, a DART gateway must maintain separate IP routing tables for each connected domain. These domains are isolated from each other at the IP layer and do not have direct inter-domain IP connectivity.</t>

<t>Therefore, a DART gateway manages two types of routing information simultaneously:</t>

<t><list style="symbols">
  <t>DART-layer logical routing table<br />
Used to make forwarding decisions based on the destination FQDN contained in packets, determining which downstream interface or relay gateway to forward to;</t>
  <t>IP-layer routing table for each domain<br />
Used for forwarding IP packets within that domain, including communication between hosts and interaction with the DART gateway. Each IP routing table is valid only within its respective domain and does not support cross-domain addressing.</t>
</list></t>

<t>The IP layer routing mechanisms are mature and well-established and will not be elaborated here. The following focuses on DART-layer routing and forwarding principles:</t>

<t><list style="symbols">
  <t>Domain name-based routing control<br />
DART gateways maintain logical routing tables organized by domain and forward packets according to the target Fully Qualified Domain Name (FQDN). DART employs a strictly hierarchical FQDN addressing system with globally unique addresses, abandoning prefix aggregation and traditional IP subnet nesting.</t>
  <t>Elimination of prefix holes and fragmentation issues<br />
Thanks to the natural separation afforded by domain name addressing, DART completely avoids prefix overlap, address penetration, and routing fragmentation problems. This significantly simplifies global routing table structures, enhances controllability and scalability, and effectively overcomes the scalability bottlenecks of IPv4 and BGP.</t>
  <t>DNS-assisted protocol identification and path selection
  <list style="symbols">
      <t>Special CNAME prefixes in DNS query results (e.g., dart-host. or dart-gateway.) indicate whether the target host or relay supports DART protocol;</t>
      <t>A / AAAA records in DNS responses provide the next-hop IP address required by the IP layer, which may be the ultimate target host or a relay DART gateway.</t>
      <t>Utilizing CNAME redirection to A records in DNS responses enables, under full compatibility with existing DNS protocols, the simultaneous return of whether the target host supports DART and its corresponding IP address, thereby improving resolution efficiency and protocol compatibility.</t>
    </list></t>
</list></t>

</section>
<section anchor="hierarchical-address-encryption-and-policy-visibility"><name>Hierarchical Address Encryption and Policy Visibility</name>

<t>To enhance privacy, DART allows the destination address field to be encrypted. This prevents intermediate nodes from observing the full semantic identity of the communication target. However, if a single-layer or fully opaque encryption scheme is applied, intermediate network devices-such as firewalls or DART-aware gateways-may lose visibility into the FQDN and thus be unable to enforce domain-based policies (see <xref target="native-fqdn-based-policy-enforcement"/>).</t>

<t>To reconcile the need for privacy with the operational requirements of policy enforcement, DART supports a Hierarchical Decryption mechanism. In this model, the destination FQDN is logically divided into multiple domain levels (e.g., www.example.com --&gt; com, example, www), each of which is encrypted independently. Each layer of the network may decrypt only the domain segments it is authorized to process.</t>

<t>Example Structure</t>

<t>A destination domain such as www.example.com is encrypted as a sequence of encrypted domain labels:</t>

<t><spanx style="verb">
Encrypted_Domain = Encrypt_Level3("www") + Encrypt_Level2("example") + Encrypt_Level1("com")
</spanx></t>

<t>A national-level gateway may only decrypt the Level1 component (e.g., .com, .gov.cn) for regulatory filtering, while enterprise gateways may decrypt Level2 or deeper subdomains within their own namespace.</t>

<t>Design Guidelines</t>

<t><list style="symbols">
  <t>DART headers SHOULD include structured, layered domain representations, encoded in a format that enables per-level processing (e.g., TLV or label stacks).</t>
  <t>Encryption MAY use symmetric or asymmetric cryptographic schemes, depending on the trust model and deployment scale.</t>
  <t>Each gateway or policy node holds only the decryption keys for its authorized domain layers, enabling partial semantic visibility.</t>
  <t>The encryption hierarchy aligns with domain delegation and administrative boundaries, not physical routing paths.</t>
</list></t>

<t>Benefits</t>

<t>This approach enables:</t>

<t><list style="symbols">
  <t>End-host privacy: Prevents exposure of full FQDNs to unauthorized intermediate nodes.</t>
  <t>Scoped policy enforcement: Enables intermediate devices to make decisions based on locally visible domain levels.</t>
  <t>Granular trust models: Different administrative layers decrypt only the information they are entitled to process.</t>
  <t>Deployment flexibility: Can be combined with routing delegation and overlay mechanisms.</t>
</list></t>

<t>Comparison to Onion Routing</t>

<t>Although inspired by onion routing, DART&#39;s hierarchical address encryption differs in that:</t>

<t><list style="symbols">
  <t>Decryption layers are based on domain hierarchy, not hop count;</t>
  <t>Partial visibility is a feature, not a byproduct;</t>
  <t>Policy enforcement and routing remain cooperative, not adversarial.</t>
</list></t>

<t>This mechanism provides a scalable compromise between address confidentiality and operational control, supporting a wide range of deployment models including regulatory environments, enterprise segmentation, and cross-domain interoperability.</t>

</section>
</section>
<section anchor="nat-dart-4-and-address-virtualization"><name>NAT-DART-4 and Address Virtualization</name>
<t>To ensure compatibility with IPv4-only hosts that do not support the DART protocol, DART introduces the NAT-DART-4 translation mechanism. At the core of this mechanism is the concept of a virtual address, sometimes also referred to as a pseudo address.</t>

<t>The virtual address serves as an abstraction layer that enables transparent communication between IPv4-only hosts and the DART network, allowing protocol interoperability without requiring changes to legacy systems.</t>

<section anchor="definition-of-virtual-addresses"><name>Definition of Virtual Addresses</name>
<t>A virtual address is a pseudo address mapped to a remote FQDN, dynamically allocated by the local DART gateway. It is locally scoped and has no global significance. The introduction of virtual addresses serves two main purposes:</t>

<t><list style="symbols">
  <t>To assign a unique virtual address to each remote FQDN acting as a communication target, allowing local IPv4-only hosts to distinguish between different remote hosts at the IP layer;</t>
  <t>To ensure that any assigned virtual address, when used as the destination address in an IP packet, can be properly routed to the local DART gateway according to standard IP routing rules.</t>
</list></t>

<t>In theory, any unallocated IPv4 address within the local DART subdomain can be used as a virtual address. However, to reduce conflict and improve deployment consistency, it is recommended to select addresses from a designated private address pool. The virtual address pool should meet the above routing requirement and maintain logical isolation from the public network.</t>

<t>Considering factors such as availability, standard compliance, and deployment safety, the address block 198.18.0.0/15, reserved by RFC 2544 for benchmarking purposes, is recommended as the primary address pool.</t>

<t>If additional address space is needed (e.g., in carrier-grade environments), a subnet from 100.64.0.0/10, reserved by RFC 6598 for Carrier-Grade NAT (CGN), may also be used as a virtual address pool-provided it does not overlap with actual CGN usage in the deployment environment.</t>

</section>
<section anchor="allocation-and-reclamation-of-virtual-addresses"><name>Allocation and Reclamation of Virtual Addresses</name>
<t>Virtual addresses are dynamically allocated upon network access and reclaimed appropriately to prevent exhaustion of the virtual address pool. The process includes:</t>

<t><list style="symbols">
  <t>For access requests initiated by local IPv4-only hosts, the DART domain&#39;s DNS server dynamically allocates virtual addresses when responding to the corresponding DNS queries;</t>
  <t>For access initiated by remote hosts targeting local IPv4-only hosts, the DART gateway&#39;s forwarding module shall allocate the corresponding virtual address prior to forwarding;</t>
  <t>The system must maintain mappings between FQDNs and virtual addresses along with ports. Due to the presence of NAT, the source port of packets passing through NAT may not remain fixed (e.g., to port 0xDA27), thus port mapping is a critical component for connection identification;</t>
  <t>Time-to-live (TTL) or least-recently-used (LRU) policies can be employed to age and evict mappings, ensuring the mapping table remains timely and space-efficient;</t>
  <t>Different combinations of remote domain names and ports shall map to distinct virtual addresses to enable the gateway to accurately distinguish and identify traffic destined for various target hosts.</t>
</list></t>

</section>
<section anchor="nat-dart-4-workflow"><name>NAT-DART-4 Workflow</name>

<t>Scenario 1: Local IPv4-only Host Initiates Access</t>

<t><list style="numbers" type="1">
  <t>The initiator is a local IPv4-only host;</t>
  <t>The target resides in a remote DART domain;</t>
  <t>The local host issues a DNS query, and the DNS response returns a virtual address allocated from the virtual address pool (not the gateway&#39;s actual ingress address);</t>
  <t>Since the virtual address is not assigned to a real host, according to the local host&#39;s routing rules, packets destined to this virtual address are sent to the default gateway, i.e., the local DART gateway;</t>
  <t>The gateway looks up the mapping for the virtual address and restores the real target FQDN;</t>
  <t>The gateway inserts the DART header, encapsulates the packet, and forwards it to the target DART domain.</t>
</list></t>

<t>Scenario 2: Remote Host Initiates Access to Local IPv4-only Host</t>

<t><list style="numbers" type="1">
  <t>The initiator is a remote host, targeting a local IPv4-only host;</t>
  <t>The remote host communicates using the real target FQDN;</t>
  <t>Packets arrive at the local DART gateway, which looks up the mapping of the FQDN plus port to a virtual address; if no mapping exists, the gateway dynamically allocates one;</t>
  <t>The allocated virtual address is used as the source address in the restored IP packet, while the destination address is the real IP of the local IPv4-only host;</t>
  <t>The gateway forwards the packet to the local IPv4-only host;</t>
  <t>Return packets sent by the local IPv4-only host are addressed to the virtual address; the gateway restores the original FQDN based on the mapping and forwards the packets back to the remote host.</t>
</list></t>

<t>Notes</t>

<t><list style="symbols">
  <t>The virtual address mechanism enables local IPv4-only hosts to distinguish different remote hosts, supporting bidirectional communication;</t>
  <t>The DART gateway manages mappings between virtual addresses and FQDNs;</t>
  <t>This mechanism is compatible with NAT and existing network architectures, ensuring transparent and efficient communication.</t>
</list></t>

</section>
<section anchor="oversized-packet-handling"><name>Oversized Packet Handling</name>
<t>During the encapsulation of IP packets, NAT-DART-4 inserts a UDP header and a DART header, which may cause the resulting packet to exceed the MTU.</t>

<t>To ensure reliable delivery, the following mechanisms are proposed for handling oversized packets. They are presented in the order of recommendation priority.</t>

<section anchor="mss-clamping-recommended"><name>MSS Clamping (Recommended)</name>
<t>In TCP connections, the DART gateway or edge host may adjust the MSS (Maximum Segment Size) during the TCP handshake to reserve enough space for the DART header.</t>

<t>Advantages:</t>

<t><list style="symbols">
  <t>Proactively avoids MTU violations.</t>
  <t>Requires no runtime signaling.</t>
  <t>Supported by most TCP stacks and firewall/NAT equipment.</t>
</list></t>

<t>Drawbacks:</t>

<t><list style="symbols">
  <t>Applicable only to TCP traffic.</t>
  <t>Requires inspection or modification of TCP handshake packets.</t>
</list></t>

<t>Use Cases:</t>

<t><list style="symbols">
  <t>Ideal for hosts or gateways initiating TCP sessions.</t>
  <t>Common in access networks or CPE devices that implement TCP MSS rewriting.</t>
</list></t>

</section>
<section anchor="path-mtu-discovery-pmtud"><name>Path MTU Discovery (PMTUD)</name>
<t>The network can rely on standard Path MTU Discovery mechanisms, in which intermediate routers generate ICMP &quot;Packet Too Big&quot; messages to inform the sender.</t>

<t>Advantages:</t>

<t><list style="symbols">
  <t>Protocol-agnostic (works for TCP, UDP, etc.).</t>
  <t>Standards-compliant and widely supported.</t>
</list></t>

<t>Drawbacks:</t>

<t><list style="symbols">
  <t>ICMP filtering may prevent delivery of &quot;Packet Too Big&quot; messages.</t>
  <t>Initial packet loss occurs before adjustment.</t>
  <t>Not reliable across all firewalls or carrier-grade NATs.</t>
</list></t>

<t>Use Cases:</t>

<t><list style="symbols">
  <t>Suitable for end-to-end communication over networks with proper ICMP support.</t>
  <t>Best used in environments with known ICMP reliability.</t>
</list></t>

</section>
<section anchor="mtu-increase-by-network-provisioning"><name>MTU Increase by Network Provisioning</name>
<t>Network operators may provision larger MTU values on key network segments (e.g., 1600 bytes) to accommodate DART headers and ensure encapsulated packets fit.</t>

<t>Advantages:</t>

<t><list style="symbols">
  <t>Transparent to endpoints.</t>
  <t>Works with all protocols and traffic types.</t>
</list></t>

<t>Drawbacks:</t>

<t><list style="symbols">
  <t>Requires administrative changes to network infrastructure.</t>
  <t>May not be feasible in all environments (e.g., across the public internet).</t>
</list></t>

<t>Use Cases:</t>

<t><list style="symbols">
  <t>Effective in controlled enterprise or data center environments.</t>
  <t>Suitable for backbone links or intra-domain DART overlay networks.</t>
</list></t>

</section>
<section anchor="packet-fragmentation-least-preferred"><name>Packet Fragmentation (Least Preferred)</name>
<t>DART gateways may fragment oversized packets during forwarding, using either IP-layer fragmentation or application-layer splitting.</t>

<t>Advantages:</t>

<t><list style="symbols">
  <t>Ensures delivery even when no other mitigation is available.</t>
</list></t>

<t>Drawbacks:</t>

<t><list style="symbols">
  <t>Fragmentation introduces processing overhead and reliability issues.</t>
  <t>IPv6 discourages in-network fragmentation.</t>
  <t>May interfere with middleboxes or degrade performance.</t>
</list></t>

<t>Use Cases:</t>

<t><list style="symbols">
  <t>Emergency fallback when other methods fail.</t>
  <t>Use with caution in highly heterogeneous or unmanaged networks.</t>
</list></t>

<t>Summary</t>

<t>MSS Clamping is the most effective and widely compatible method for avoiding DART-related MTU issues, particularly for TCP traffic. PMTUD serves as a secondary method but depends on ICMP reliability. Raising MTU provides the best experience but requires network-wide coordination. Fragmentation should be used only as a last resort due to performance and compatibility concerns.</t>

</section>
</section>
</section>
<section anchor="nat44"><name>NAT44</name>
<t>For IP packets originating from a subdomain and destined for a public IPv4-only host, the DART gateway may optionally perform NAT44 encapsulation, treating the packet as an exception path for forwarding.</t>

<t>Due to the technical constraints of NAT44, the subdomain (i.e., the downstream domain of the DART gateway) is required to use private IPv4 address space for internal address assignment.</t>

<t>NAT44 is a mature and widely deployed legacy technology. Although it is not part of the DART protocol specification, it is fully compatible with DART. In practice, enabling NAT44 on DART gateways-especially those located at the network edge-can facilitate access to public IPv4-only destinations and promote a smoother and more incremental transition toward DART deployment.</t>

</section>
<section anchor="routing-autonomy"><name>Routing Autonomy</name>
<t>The DART protocol preserves full end-to-end semantics. The source host can determine whether the destination supports DART by examining the CNAME prefix in the DNS response, without relying on intermediate hops or centralized path computation. Path selection is driven by the DNS control plane and the distributed routing tables maintained by DART gateways, forming a decentralized routing control loop.</t>

<t>DART employs a hierarchical domain-based architecture, where each DART domain (i.e., DNS domain) operates as an independent routing autonomy. Within each domain, the DART gateway maintains and updates the routing table autonomously. This structure supports incremental deployment, hierarchical scalability, and high controllability.</t>

<t>Although DART does not rely on a centralized controller for routing management, it does not preclude the optional use of centralized components in specific scenarios-for example, to optimize inter-domain paths, distribute policy updates, or provide global visualization capabilities. The design and deployment of such mechanisms are left to implementers and operators and are outside the scope of this document.</t>

</section>
<section anchor="implicit-source-routing-capability"><name>Implicit Source Routing Capability</name>
<t>The DART protocol uses fully qualified domain names (FQDNs) with semantic structure as address identifiers, allowing the source host to indirectly guide the forwarding path by selecting different destination domain names without explicitly specifying each hop. This mechanism forms a capability similar to &quot;implicit source routing,&quot; granting the endpoint partial control over path selection.</t>

<t>Within the DART network, gateways make forwarding decisions based on local inter-domain routing tables and DNS query results. Due to the hierarchical naming nature of DNS, different target FQDNs-even if pointing to the same physical host-may logically belong to different parent domains or path structures, resulting in variations in forwarding paths. Provided these FQDNs and their resolution records are pre-configured in DNS and DART routing policies, the source host can realize logical path guidance by choosing among multiple FQDNs.</t>

<t>For example, the same host may be accessed via host1.city-a.example.dart or host1.city-b.example.dart, which respectively steer traffic through different subdomain gateways, enabling path diversity. This design does not rely on explicit routing headers or centralized controllers but establishes a logically guided system with predictable and controllable path behavior through the interplay of DNS and distributed DART gateways.</t>

<t>Essentially, this mechanism embodies a semantics-driven path selection model that combines the flexibility of source routing with the autonomy of a distributed architecture, akin to &quot;implicit loose source routing.&quot; Path control depends on the naming structure and deployment policies, lacking on-demand dynamic path specification but offering substantial policy flexibility.</t>

<t>It is important to note that the DART architecture generally adheres to a &quot;single parent domain principle,&quot; where each DART gateway logically belongs to only one parent domain, maintaining a tree-like hierarchical structure. However, in certain practical scenarios, the local DART gateway may need to support multiple parent domain interfaces to enable multi-path access. In such cases, this locally breaks the &quot;single parent domain&quot; rule by allowing the gateway to connect to multiple parent domains simultaneously, thereby providing multiple logical path entries for the end host.</t>

<t>While this extension increases gateway topology complexity, it significantly enhances path redundancy and flexibility. Therefore, the DART architecture should accommodate such multi-parent domain access needs while preserving the overall clarity of the hierarchical structure. Relevant details and specification refinements are left for further discussion in future work.</t>

<t>Through the above mechanism, DART not only improves path controllability and resilience but also empowers endpoints with richer policy options without requiring protocol extensions, demonstrating the notable advantages of a naming-based network architecture.</t>

</section>
</section>
<section anchor="nat-traversal-and-compatibility"><name>NAT Traversal and Compatibility</name>
<t>To ensure compatibility with existing network environments, DART encapsulates packets over UDP, providing limited adaptation to mainstream NAT behaviors-especially outbound connection mapping mechanisms. This approach lowers deployment barriers and facilitates smooth transition. However, DART&#39;s design philosophy does not simply accommodate the existence of NAT; instead, it aims to fundamentally eliminate the long-term necessity of NAT. Therefore, DART does not pursue aggressive traversal techniques such as UDP hole punching to forcibly penetrate all types of NAT. Rather, DART adopts a moderate compatibility stance without excessive compromise, applying appropriate upgrade pressure on certain NAT gateways and guiding network infrastructure evolution toward the DART architecture.</t>

<section anchor="nat-background"><name>NAT Background</name>

<t>Network Address Translation (NAT <xref target="RFC4787"/>, <xref target="RFC5128"/>) has been widely deployed in enterprise and home networks to alleviate the IPv4 address exhaustion problem. By modifying packet headers and maintaining connection mappings, NAT allows multiple internal hosts to share a single public IPv4 address.</t>

<t>However, NAT breaks the original end-to-end communication model of the Internet, especially introducing additional complexity and protocol incompatibility issues for applications requiring inbound connections or using non-standard protocols. Therefore, NAT is both a technical compromise and an architectural trade-off.</t>

</section>
<section anchor="compatibility-encapsulation-udp"><name>Compatibility Encapsulation: UDP</name>
<t>To facilitate deployment in existing network environments during the transition phase, DART packets are encapsulated within UDP datagrams. This approach allows DART traffic to traverse NAT gateways, firewalls, and other intermediate devices without requiring modifications to existing network equipment.</t>

<t>DART currently uses UDP destination port 0xDA27 (decimal 55847) for encapsulated communication.</t>

<t>Encapsulation over UDP provides the following compatibility advantages:</t>

<t><list style="symbols">
  <t>Supports outbound NAT traversal: most NAT gateways permit internal devices to initiate outbound UDP connections and dynamically establish return paths;</t>
  <t>Compatible with firewall policies: UDP traffic is generally allowed in the outbound direction;</t>
  <t>Avoids interference from intermediate devices: DART packets are treated as ordinary UDP traffic, reducing the risk of filtering due to unknown protocols.</t>
</list></t>

</section>
<section anchor="compatibility-with-existing-infrastructure"><name>Compatibility with Existing Infrastructure</name>
<t>Because DART packets are encapsulated within standard UDP datagrams, from the perspective of NAT gateways, firewalls, and routers, their behavior is indistinguishable from ordinary UDP traffic. Therefore, DART can operate over the current IPv4 network without requiring modifications to existing devices or network architectures, even when the network includes multiple layers of nested NAT.</t>

<t><list style="symbols">
  <t>Naturally, under this mode, DART hosts remain subject to NAT behavior limitations. For example, hosts can only initiate connections actively; to accept incoming connections, IP and port mappings must still be configured on NAT gateways.</t>
  <t>This characteristic allows DART devices to be deployed relatively freely within existing networks. Even if upstream devices have not yet adopted the DART protocol, underlying hosts can connect first, thus enabling a &quot;transparent, incremental&quot; evolutionary deployment path.</t>
</list></t>

</section>
<section anchor="design-position-on-nat-traversal-techniques"><name>Design Position on NAT Traversal Techniques</name>
<t>Traditional UDP applications often use NAT traversal techniques such as UDP hole punching, STUN, and TURN to establish peer-to-peer connections. However, these approaches are not aligned with the design goals of the DART protocol.</t>

<t>The core objective of DART is to localize the scope of IP addresses, enabling virtually unlimited address space reuse and thus providing an abundant supply of addresses. This reduces the necessity and relevance of traditional NAT gateways.</t>

<t>Therefore, implementers of the DART protocol should not incorporate NAT traversal techniques (e.g., UDP hole punching) within the protocol. Although such techniques remain practical in conventional networks, they are considered outdated within the DART architecture. The focus of research and implementation should be on promoting native DART network deployment and minimizing dependency on NAT, rather than continuing to provide compatibility adaptations for NAT.</t>

<t>By reducing intermediate-layer processing and simplifying the protocol stack, DART implementers can more easily achieve efficient and controllable end-to-end communication, truly restoring the original Internet principle of direct connectivity.</t>

</section>
</section>
<section anchor="deployment-and-evolution-strategy"><name>Deployment and Evolution Strategy</name>
<t>One of the design goals of the DART protocol is to introduce virtually unlimited address space and domain name-based addressing capabilities without disrupting the operation of the existing IPv4 network, while maintaining compatibility with current IPv4 access. To this end, DART offers a gradual deployment path that adapts to today&#39;s highly complex and heterogeneous Internet environment.</t>

<section anchor="technical-requirements-and-deployment-prerequisites"><name>Technical Requirements and Deployment Prerequisites</name>
<t>The DART protocol leverages the DNS system as its control plane. Addressing, domain name resolution, and host registration within DART rely heavily on DNS coordination. Therefore, before deploying DART gateways and DART-ready hosts, the following technical requirements must be met:</t>

<t><strong>DNS System Capabilities</strong></t>

<t><list style="symbols">
  <t>Authoritative Domain Delegation: Each DART subdomain must be registered with the DNS system through authoritative delegation. Upon deploying a DART gateway, operators need to delegate the corresponding subdomain in the parent DNS servers to map domain names to the DART gateway.</t>
  <t>Bidirectional FQDN-to-Address Mapping: The DNS system must support correct mapping from host FQDNs to DART addresses (A records or virtual addresses), as well as support reverse PTR queries to enhance manageability.</t>
  <t>Dynamic Registration and Automation: To facilitate dynamic scaling and elastic deployment of the DART network, DNS systems should provide interfaces for automatic registration (e.g., DNS UPDATE, API, or protocol extensions) allowing hosts and gateways to register their domain information upon connection.</t>
</list></t>

<t><strong>DART Gateway Requirements</strong></t>

<t><list style="symbols">
  <t>DNS Control Plane Integration: DART gateways should actively register their subdomains, maintain virtual address mapping tables, and periodically synchronize resolution states with DNS.</t>
  <t>Independent Management: Gateways must independently manage their subdomain address and naming spaces.</t>
  <t>Full DART Encapsulation/Decapsulation: Gateways shall implement complete DART encapsulation and decapsulation logic, including support for NAT-DART-4 (optional) and DART packet forwarding.</t>
  <t>Parent Domain Uplink: Network interfaces must be properly configured with parent domain information to ensure correct inter-domain routing.</t>
</list></t>

<t><strong>DART-Ready Host Requirements</strong></t>

<t><list style="symbols">
  <t>DART Packet Support: Hosts must be capable of generating and parsing DART packets, either through protocol stack upgrades, user-space daemons, or APIs.</t>
  <t>DNS Query Capability: Hosts should be able to actively query DNS for DART address information and establish connections accordingly.</t>
  <t>FQDN Registration: To receive incoming connections, hosts must be able to register their FQDNs within their respective DART subdomain DNS.</t>
</list></t>

<t>Subsequent sections will describe typical deployment models for national-level DART gateways, ISP internal DART gateways, edge gateways (home and enterprise), and hosts. Prior to device deployment, ensure DNS system capabilities meet these requirements and establish unified domain and address management coordination within the organization.</t>

</section>
<section anchor="deployment-of-dart-ready-hosts"><name>Deployment of DART-Ready Hosts</name>

<section anchor="capability-requirements-for-dart-capable-hosts"><name>Capability Requirements for DART-capable Hosts</name>

<t>DART-capable Host refers to a network node that implements the DART protocol stack, including both public servers and end devices. Such a host MUST be able to generate and parse DART packets.</t>

<t>Deployment of DART capabilities can be achieved through, but is not limited to, the following approaches:</t>

<t><list style="symbols">
  <t>upgrading the operating system kernel or network protocol stack;</t>
  <t>installing a user-space daemon;</t>
  <t>integrating the DART protocol stack via an SDK or API.</t>
</list></t>

<t>A DART-capable host MUST be able to communicate directly using Fully Qualified Domain Names (FQDNs), without relying on fixed IP addresses, thereby enabling elastic deployment, automatic addressing, and cross-domain communication.</t>

<t>Due to the compatibility properties of the DART protocol, a DART-capable host can coexist with existing IP protocols. For example:</t>

<t><list style="symbols">
  <t>An IPv4-only host, once upgraded to support DART, MUST retain its IPv4 communication capability and continue to access existing Internet services without requiring the presence of a DART gateway.</t>
  <t>Similarly, an IPv6-only host upgraded with DART capability MUST retain its IPv6 communication capability.</t>
</list></t>

<t>This property of &quot;forward enhancement and backward compatibility&quot; ensures that host devices MAY be upgraded independently of changes to the underlying network infrastructure, thereby supporting flexible and incremental deployment of DART.</t>

</section>
<section anchor="dart-capable-public-servers"><name>DART-capable Public Servers</name>
<t>The deployment of a DART network relies on the support of public servers. As providers of fundamental Internet services, upgrading public servers to DART-capable hosts is a prerequisite for enabling inter-domain communication and efficient utilization of address space.</t>

<t>In the following cases, public servers MUST provide native DART protocol support:</t>

<t><list style="symbols">
  <t>When a large region (e.g., a country) upgrades to an independent DART subdomain, the DART gateways connecting this subdomain to the global Internet CANNOT enable NAT44 (which requires private internal addressing) or NAT-DART-4 (which requires an excessively large pool of pseudo addresses). In such cases, servers on the global Internet MUST support DART for hosts in the subdomain to reach them.</t>
  <t>Because the range of access sources is highly diverse, public servers SHOULD NOT rely on protocol conversion software (e.g., DartWinDivert, essentially a host-based NAT-DART-4 implementation).</t>
  <t>In these circumstances, only native DART support on servers MUST be used.</t>
</list></t>

<t>Although the number of public servers is large, the diversity of operating systems they run is limited. Therefore, upgrading them is considered manageable. Prioritizing DART support in mainstream server operating systems and cloud service platforms MAY provide a stable foundation for expanding the DART ecosystem. Upgrading public servers WILL improve overall DART compatibility and interoperability.</t>

<t>After upgrading to DART readiness, a public server MUST update its DNS zone to signal this capability. Specifically, the authoritative DNS server for the domain SHOULD insert a CNAME resource record with the prefix &quot;dart-host.&quot; before the final A record is returned.</t>

<t>For example, when a client queries www.example.com, and the host has been upgraded to DART readiness, the DNS response would be structured as follows:</t>

<figure><artwork><![CDATA[
www.example.com.            CNAME    dart-host.www.example.com.  
dart-host.www.example.com.  A        A.B.C.D
]]></artwork></figure>

<t>This mechanism ensures compatibility with existing DNS standards, while providing differentiated behavior for DART-capable and non-DART-capable clients in a single query:</t>

<t><list style="symbols">
  <t>A non-DART-capable client will process the A record and obtain the correct IPv4 address (A.B.C.D).</t>
  <t>A DART-capable client will additionally detect the CNAME record prefixed with &quot;dart-host.&quot; and thereby recognize that the queried host supports DART.</t>
</list></t>

</section>
<section anchor="dart-capable-end-devices"><name>DART-capable End Devices</name>
<t>End devices typically access the network through a Customer Premises Equipment (CPE). If the CPE is DART-ready, it must implement DHCP-DNS coordination to meet the control-plane requirements of the DART protocol. When NAT-DART-4 is enabled, all IPv4-only end devices connected beneath it can appear as DART-ready terminals and support bidirectional communication. If NAT44 is also enabled, access to non-upgraded public servers is preserved.</t>

<t>From an architectural perspective, upgrading the CPE is the ideal choice. Technically, if the device has sufficient performance and supports software upgrades, software upgrading should be prioritized; otherwise, hardware replacement is required, which incurs higher costs. If necessary, NAT-DART-4 can also be enabled at a slightly higher network level to bypass the need for upgrading the CPE.</t>

<t>As a result, the upgrade of end devices is NOT an immediate requirement. Such upgrades MAY be introduced incrementally after other parts of the network are largely deployed.</t>

</section>
</section>
<section anchor="deployment-of-dart-gateways"><name>Deployment of DART Gateways</name>

<t>Each deployment of a DART gateway that establishes a new subdomain is allocated a complete IPv4 address space (i.e., 2^32 addresses) within that domain. Therefore, only a limited number of DART gateways are required to effectively mitigate the problem of IPv4 address exhaustion.</t>

<section anchor="national-level-dart-gateway"><name>National-level DART Gateway</name>

<t>A national-level DART gateway is deployed at the Internet entry/exit points of a country (e.g., international link exits) and functions as the backbone node for inter-domain communication.</t>

<t>Its functions and constraints are as follows:</t>

<t><list style="symbols">
  <t>A national-level DART gateway MUST perform forwarding of DART packets and inter-domain address resolution.</t>
  <t>A national-level DART gateway MUST NOT use NAT44 (which requires private internal addresses) or NAT-DART-4 (which requires an excessively large pseudo address pool).</t>
  <t>After deployment, the internal network MAY implement local IPv4 address reuse and address planning.</t>
</list></t>

<t>Deployment conditions:</t>

<t><list style="symbols">
  <t>Public servers SHOULD have completed DART upgrade</t>
  <t>There must be a suitably positioned DART gateway that has enabled NAT-DART-4 to provide address translation services for accessing IPv4-only terminals.</t>
</list></t>

<t>Behavior after deployment:</t>

<t><list style="symbols">
  <t>End devices within the domain, regardless of upgrade status, MAY access the DART network.</t>
  <t>Hosts inside the domain CAN NOT directly access servers outside the domain that have not been upgraded.</t>
  <t>Access to non-upgraded external hosts MAY be provided via HTTP or SOCKS proxies; however, this method MUST ONLY be used as a temporary solution.</t>
</list></t>

</section>
<section anchor="dart-gateways-within-the-operator-network"><name>DART Gateways within the Operator Network</name>

<t>To address IPv4 address exhaustion, many network operators have widely deployed CGNAT (Carrier-Grade NAT) mechanisms within their internal networks. Typical CGNAT topologies often involve two layers of NAT mapping: the Customer Premises Equipment (CPE) at home performs the first NAT, while the operator&#39;s CGNAT gateway performs the second. In some smaller operators, community broadband, rural networks, campus networks, or public Wi-Fi networks, there may even be more layers of nested NAT.</t>

<t>Although multi-level NAT alleviates address shortages, it introduces numerous negative impacts such as blocked inbound connections, frequent failures of UDP traversal techniques, difficulty in tracking user behavior, and severe degradation of P2P performance. The DART protocol offers a more natural and scalable alternative in such deeply nested NAT environments.</t>

<t>Operators can upgrade existing CGNAT gateways to DART gateways to obtain a full IPv4 address space and significantly simplify the network architecture. Possible Deployment Paths:</t>

<t>There are two main deployment paths for operators when introducing DART:</t>

<t><list style="numbers" type="1">
  <t>Upgrading only the top-level NAT gateway to a DART gateway
  <list style="symbols">
      <t>The operator MAY immediately obtain the full IPv4 address space (2^3^2) and downgrade lower-level NAT gateways to ordinary IP routers.</t>
      <t>This approach involves the shortest deployment path and minimal device modifications; however, because the lower-level networks previously used private addresses, the operator MUST reassign addresses to all downstream end devices, which may incur address reallocation costs and operational overhead.</t>
      <t>This path SHOULD assume that public servers and CPE gateways have already been upgraded to DART-capable.</t>
    </list></t>
  <t>Full upgrade to a hierarchical DART gateway structure
  <list style="symbols">
      <t>The operator MAY replace all NAT gateways at multiple layers with DART gateways, maintain each layer as an independent subdomain, and continue using the existing address allocation logic.</t>
      <t>Since the DART protocol eliminates the distinction between &quot;private&quot; and &quot;public&quot; addresses, each subdomain MAY have the full address space, without concerns for address conflicts or the need to retain traditional private address concepts.</t>
      <t>This approach facilitates hierarchical management and incremental deployment, requires a limited number of DART gateways, does not significantly increase overall deployment costs, and provides scalability for future connections to the DART core domain.</t>
      <t>During the upgrade transition, DART gateways MAY continue to enable NAT44 to maintain the existing multi-level NAT architecture, and MUST disable NAT44 once public servers and CPEs are upgraded.</t>
    </list></t>
</list></t>

</section>
<section anchor="home-gateways"><name>Home Gateways</name>
<t>At the network edge, home gateways can adopt one of three configurations.</t>

<section anchor="bridging-as-a-layer-2-device"><name>Bridging as a Layer 2 Device</name>
<t>After the upstream operator network has been upgraded to support DART, converting a home gateway into a Layer 2 bridge shifts the burden of NAT44 and NAT-DART-4 to the operator-side DART gateways. This setup may lead to multiple households sharing the same Ethernet broadcast domain, posing risks to network performance and security. Therefore, this option has significant deployment drawbacks and is generally not recommended.</t>

</section>
<section anchor="operating-as-a-layer-3-router-with-nat-disabled"><name>Operating as a Layer 3 Router (with NAT disabled)</name>

<t>After the ISP completes the DART network upgrade, home gateways can operate purely as IP routers, with their address ranges uniformly assigned by the ISP. If they continue to serve as DHCP servers, they must first obtain the subnet assigned by the ISP, which may limit user autonomy over home gateway configuration and increase management and maintenance complexity.</t>

<t>At this stage, NAT44/NAT-DART-4 must be performed on the ISP&#39;s internal DART gateways. The advantage is that CPEs do not require large-scale upgrades. However, care must be taken not to place the DART gateway too high in the topology; otherwise, the number of external hosts accessed by downstream devices may exceed the capacity of the pseudo-address pool.</t>

</section>
<section anchor="upgrading-to-a-dart-gateway"><name>Upgrading to a DART Gateway</name>

<t>In this configuration, the home gateway is upgraded to support the DART protocol stack and independently maintains a DART subdomain. It connects upstream to the operator&#39;s DART network via its parent domain interface. Internally, it may enable NAT-DART-4 to allocate virtual addresses for legacy IPv4-only devices, ensuring seamless compatibility.</t>

<t>This solution offers several advantages:</t>

<t><list style="symbols">
  <t>Autonomy and flexibility: The home gateway manages its local address space and FQDN mappings independently, allowing users to configure policies without relying on the operator;</t>
  <t>Legacy device compatibility: IPv4-only devices can connect without any modification;</t>
  <t>Support for early deployment: Even if the operator&#39;s network has not yet been upgraded, the gateway can still enable traditional NAT44, allowing the home network to transition to DART ahead of its upstream infrastructure;</t>
  <t>Strong scalability: As an independent subdomain, the gateway can host local services and smart devices, supporting both local and cross-domain communication;</t>
  <t>Reduced upstream load: DART encapsulation and address translation are handled locally, offloading processing pressure from the operator&#39;s DART gateways.</t>
</list></t>

<t>Considerations:
- The device must support the DART protocol stack, which may require hardware or software upgrades;
- The upstream interface must be configured with the parent domain information provided by the operator to enable correct inter-domain routing.</t>

<t>Security Protection and Firewall Capabilities</t>

<t>After a home gateway is upgraded to support the DART protocol, internal hosts will be assigned publicly routable addresses, making access control mechanisms essential. As the critical node connecting the home network to the external world, the gateway should incorporate basic security features to protect household devices from external attacks and unauthorized access.</t>

<t><list style="symbols">
  <t>The firewall should automatically manage traffic entering and leaving the home network, blocking potential threats without requiring complex user configuration;</t>
  <t>Simple access control options should be provided to help users restrict specific devices or services from connecting to the network;</t>
  <t>Full compatibility with the DART protocol must be ensured to maintain the security of internal devices in DART-enabled environments;</t>
  <t>To enhance the security of home and small networks, the gateway should, by default, block all unsolicited inbound connection attempts from external sources. It is recommended to support a UPnP-like dynamic port mapping mechanism that allows internal hosts to securely request the exposure of specific ports through an authenticated process. This strikes a balance between security and flexibility, simplifying configuration for non-technical users while improving overall network usability and protection.</t>
</list></t>

<t>Users are advised to always keep security features enabled and to install official firmware updates in a timely manner to maintain network stability and protection.</t>

<t>Summary</t>

<t>This configuration offers full backward compatibility while enabling independent, progressive migration to the DART architecture. It balances flexibility, control, and long-term scalability, and is the most strategically valuable deployment path.</t>

</section>
</section>
<section anchor="enterprise-gateways"><name>Enterprise Gateways</name>

<t>Enterprise networks typically maintain their own internal subnets, address management policies, and security configurations. Within the context of DART deployment, enterprise gateways can adopt similar architectural strategies as home gateways, but with greater flexibility and scalability in address management.</t>

<t>A recommended approach is to upgrade enterprise gateways to support the DART protocol, enabling them to manage an independent DART subdomain and connect upstream to the carrier&#39;s DART domain. This solution offers the following advantages:</t>

<t><list style="symbols">
  <t>Internal Control and Autonomy: Enterprises can independently manage their DART subdomain, maintain local FQDN mappings, and define routing policies;</t>
  <t>Compatibility with Legacy Devices: IPv4-only endpoints within the enterprise can continue operating without modification via the NAT-DART-4 mechanism;</t>
  <t>Support for Gradual Deployment: Enterprises may adopt DART ahead of their upstream provider. During the transition period, the enterprise DART gateway can still enable NAT44 to maintain compatibility with the legacy IPv4 Internet;</t>
  <t>Improved Scalability and Manageability: As an independent subdomain, the enterprise network can more effectively expand services, enforce fine-grained access controls, and enable cross-domain communication.</t>
</list></t>

<t>Considerations:
- DART protocol support must be integrated into the enterprise gateway&#39;s software or hardware platform;
- The upstream interface should be configured with parent domain information provided by the carrier to ensure proper inter-domain routing;
- Given the typically higher security requirements of enterprise networks, enabling DART introduces public reachability for internal hosts, which may expand the attack surface. It is recommended to integrate firewall functionality within the enterprise DART gateway to strengthen access controls and implement robust security policies.</t>

<t>In summary, upgrading enterprise gateways into DART-compliant nodes facilitates seamless integration with the DART ecosystem, while preserving network autonomy, supporting legacy infrastructure, and enabling a smooth transition toward full DART adoption.</t>

</section>
</section>
<section anchor="incremental-deployment-and-backward-compatibility"><name>Incremental Deployment and Backward Compatibility</name>

<t>The DART protocol is designed to support compatibility and progressive evolution, with the following characteristics <xref target="RFC5555"/>:</t>

<t><list style="symbols">
  <t>It can automatically detect whether the remote peer is a DART-capable device without requiring additional signaling negotiation;</t>
  <t>All DART-capable nodes inherently support dual-stack operation and are fully compatible with traditional IP;</t>
  <t>Through the NAT-DART-4 mechanism, IPv4-only hosts can be proxied by a local DART gateway and appear externally as DART-capable nodes, enabling full bidirectional communication within the DART network;</t>
  <t>Edge DART gateways can coexist with traditional NAT44 setups, allowing IPv4-only hosts in the local network to access legacy servers on the public Internet without modification;</t>
  <t>Crucially, IPv4-only devices under an edge DART gateway can remain unmodified indefinitely while still maintaining full communication capabilities over the DART network. This ensures long-term compatibility for non-upgradable endpoints.</t>
</list></t>

<t>From a deployment strategy perspective, the DART network prefers that public servers are upgraded first to DART-ready hosts and CPEs are upgraded to DART-ready gateways (each proceeding independently, without mutual dependency). Based on this, the upgrade sequence for other network infrastructure and end devices can be flexibly determined by users or operators, without strict dependency constraints. DART does not require full-scale upgrades of end devices; instead, it leverages the capabilities of edge gateways to allow legacy devices to continue operating, ensuring a smooth transition for users.</t>

<t>Thanks to these features, DART supports incremental, on-demand deployment. Even partial upgrades do not break existing connectivity or disrupt Internet services. The upgrade process is therefore inherently smooth, allowing both users and operators to adopt DART at their own pace and without requiring a wholesale migration of their network environment.</t>

</section>
<section anchor="long-term-evolution-path"><name>Long-Term Evolution Path</name>

<t>From a long-term perspective, the DART protocol offers the following potential directions for evolution and technical advancement:</t>

<t><list style="symbols">
  <t>Progressive replacement of public IPv4 dependency<br />
DART establishes a name-centric addressing architecture, enabling end-to-end communication without the need for globally assigned public IP addresses or centralized address allocation.</t>
  <t>Full compatibility with IPv6<br />
DART can coexist and interoperate with IPv6-only networks, supporting dual-stack deployment and integrated forwarding in multi-protocol environments.</t>
  <t>Support for global unified addressing<br />
DART provides a consistent abstraction layer that facilitates seamless communication between IPv4 and IPv6 networks, paving the way for a globally unified, name-based interconnection model.</t>
  <t>Significant potential for global routing optimization
  <list style="symbols">
      <t>Theoretically unbounded DART address space eliminates the fragmentation and inefficiencies caused by IPv4 scarcity and micro-prefix allocations.</t>
      <t>Within each DNS domain, address resources are abundant, allowing for highly aggregated allocations without the need for hierarchical compression.</t>
      <t>In typical deployment scenarios, based on current DNS domain granularity and expected density, both global DART routing tables and intra-domain IP routing tables can be maintained at a manageable scale-expected to stay under 10^3 entries.</t>
    </list></t>
  <t>Transformative changes in network architecture<br />
DART inherently promotes the creation of new autonomous subdomains, leading to a distributed and hierarchical address management structure.</t>
  <t>Gradual phasing out of traditional NAT<br />
Conventional NAT gateways will be replaced by DART gateways, which provide address translation and domain isolation in a more flexible and efficient manner.</t>
  <t>Enhanced network security capabilities<br />
By leveraging FQDN-based identity and access control, DART enables stronger communication authentication and fine-grained policy enforcement.</t>
  <t>Balance between authentication and privacy<br />
DART has the potential to offer user privacy protection through dynamic naming, proxy-based forwarding, and encryption mechanisms-while maintaining reliable identity validation.</t>
  <t>Support for innovative applications and service models<br />
The flexible name mapping and dynamic routing of DART could drive the development of novel use cases such as name-based content delivery, collaborative edge computing, trusted IoT communication frameworks, and intelligent network management with QoS guarantees and routing optimization.</t>
</list></t>

<t>This evolution path provides a practical and forward-compatible roadmap for DART to gradually replace traditional IP architecture and support the foundation of the next-generation Internet infrastructure.</t>

</section>
<section anchor="native-fqdn-based-policy-enforcement"><name>Native FQDN-Based Policy Enforcement</name>

<section anchor="background"><name>Background</name>

<t>In traditional IP-based networking, policy enforcement devices such as firewalls, routers, or gateways rely primarily on IP addresses to match and apply rules. This model presents the following limitations:</t>

<t><list style="symbols">
  <t>A single service domain may resolve to different IP addresses over time (e.g., CDNs, multi-site deployments).</t>
  <t>Domain names are typically visible only at the application layer, making it difficult for network-layer devices to inspect or control access based on FQDN.</t>
  <t>The widespread adoption of encrypted DNS (e.g., DoH, DoT) and TLS 1.3 with Encrypted Client Hello (ECH) further undermines traditional DPI and SNI-based filtering.</t>
  <t>Network operators and security systems require the ability to define access policies based on semantic identifiers such as FQDNs, rather than ephemeral IP addresses.</t>
</list></t>

<t>The DART protocol addresses this challenge by natively integrating the destination Fully Qualified Domain Name (FQDN) into its addressing and routing model, enabling in-network devices to perform FQDN-aware policy enforcement without reliance on external inspection.</t>

</section>
<section anchor="protocol-level-support"><name>Protocol-Level Support</name>

<t>Each DART packet includes an explicit, structured destination FQDN field (see <xref target="packet-format"/>), which is accessible at the network layer and actively involved in routing and forwarding decisions. This design provides:</t>

<t><list style="symbols">
  <t>Protocol-native domain visibility for in-path devices, eliminating the need for DNS interception or TLS header inspection.</t>
  <t>Structured semantic identifiers for destination hosts, enabling direct matching and tagging.</t>
  <t>Reliable domain-based control, independent of IP address volatility or encryption-related obfuscation.</t>
  <t>First-packet visibility, allowing immediate policy application without requiring prior DNS resolution.</t>
</list></t>

</section>
<section anchor="use-cases"><name>Use Cases</name>
<t>The FQDN-aware nature of DART packets enables a wide range of policy applications:</t>

<t><list style="symbols">
  <t>Domain-Based Access Control
Gateways or firewalls can allow or block traffic based on explicit domain rules, without relying on third-party DNS logs or IP blacklists. For example, enterprise networks may block *.gambling.com and *.malware.site while permitting *.edu.cn or approved business domains.</t>
  <t>Granular Traffic Steering
Traffic can be routed or prioritized based on the destination domain. For example, video content from cdn.example.com may be directed to a high-bandwidth path, while update traffic to update.device.example.com may be assigned lower priority.</t>
  <t>Fine-Grained Access Policy
Enterprises can enforce access rules at the subdomain level-for instance, allowing access to vpn.internal.example.com and docs.portal.example.com, while restricting mail.personal.example.com or video.external.example.com.</t>
  <t>Domain-Based Auditing and Billing
DART gateways can classify and count traffic by destination domain, enabling security auditing, usage analytics, or differentiated billing by service category.</t>
  <t>Regulatory Compliance and Governance
Government or carrier-grade DART gateways can implement domain-based regulatory policies in real time, without relying on unstable IP blacklists or higher-layer protocol signatures.</t>
  <t>Security Policy Reinforcement
Traffic to known malicious domains (e.g., botnet C2 servers, phishing domains) can be identified and blocked natively-e.g., *.botnet.example, stealer.login.xyz-based on FQDN intelligence feeds.</t>
</list></t>

</section>
<section anchor="deployment-guidelines"><name>Deployment Guidelines</name>
<t>To leverage FQDN-based policy enforcement, DART-aware devices SHOULD support:</t>

<t><list style="symbols">
  <t>FQDN-based rule engines, including:</t>
  <t>Exact match: www.example.com</t>
  <t>Wildcard match: *.example.com</t>
  <t>Regex or domain suffix match: .*.edu.cn</t>
  <t>Structured FQDN visibility in DART packet headers, to facilitate efficient lookup and classification.</t>
  <t>Partial address visibility in encrypted modes: When address encryption is enabled, domain-aware policy devices MAY be configured to inspect only locally visible (e.g., intra-domain) FQDN segments.</t>
  <t>Dynamic policy updates, enabling rapid adaptation to new blacklists, whitelists, or domain-based QoS rules.</t>
</list></t>

</section>
<section anchor="comparison-with-legacy-systems"><name>Comparison with Legacy Systems</name>

<texttable title="Comparison with Legacy Systems" anchor="tab-comparison-with-legacy-systems">
      <ttcol align='left'>Feature</ttcol>
      <ttcol align='left'>Traditional IP Networks</ttcol>
      <ttcol align='left'>DART-Based Networks</ttcol>
      <c>Policy Matching Basis</c>
      <c>IP Address</c>
      <c>FQDN</c>
      <c>DNS Visibility</c>
      <c>Passive/sniffed</c>
      <c>Native to protocol</c>
      <c>TLS Impact (e.g., TLS 1.3 + ECH)</c>
      <c>May block visibility</c>
      <c>Unaffected</c>
      <c>Blocking Precision</c>
      <c>Low (IP instability)</c>
      <c>High (domain-specific)</c>
      <c>Management Overhead</c>
      <c>High (IP tracking/updating)</c>
      <c>Low (stable domain semantics)</c>
</texttable>

</section>
<section anchor="summary"><name>Summary</name>
<t>By treating domain names as first-class routing entities, DART enables native FQDN-based policy enforcement at every stage of the forwarding path. This enhances the security, controllability, and regulatory compliance of the network while reducing the reliance on complex DPI or opaque side-channel analysis. Implementers are encouraged to leverage this capability to improve operational visibility and policy expressiveness in both public and private networks.</t>

</section>
</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This section specifies the numeric resources required by the DART protocol during deployment and formally requests or reserves them for IANA registration and allocation.</t>

<section anchor="udp-port-assignment"><name>UDP Port Assignment</name>

<t>The DART protocol relies on UDP as its transport encapsulation format. Therefore, an officially assigned UDP port number is required to identify DART packets <xref target="RFC8126"/>.</t>

<t><list style="symbols">
  <t>Name: DART</t>
  <t>Transport Protocol: UDP</t>
  <t>Suggested Port Number: 0xDA27 (decimal 55847)</t>
  <t>Usage Description: DART packets are encapsulated in UDP to support NAT traversal and compatibility with existing IP networks. All DART-capable gateways and hosts listen on this port.</t>
</list></t>

<t>Note: UDP port 55847 is currently used for experimental purposes. Once the protocol proceeds through the IETF standardization process, an official Well-Known Port (WKP) under 1024 will be formally requested from IANA.</t>

</section>
<section anchor="dns-cname-prefix-conventions-non-iana"><name>DNS CNAME Prefix Conventions (Non-IANA)</name>

<t>To indicate whether a host supports the DART protocol, special CNAME prefixes in DNS responses are used. This draft proposes the following naming conventions:</t>

<t><list style="symbols">
  <t>dart-host.: Indicates that the target host is DART-capable and can receive DART-encapsulated packets directly.</t>
  <t>dart-gateway.: Indicates that the target host resides in another DART subdomain; packets should be forwarded to the local DART gateway. The associated A record provides the gateway&#39;s IP address.</t>
</list></t>

<t>These prefixes do not require formal IANA reservation but are recommended for documentation and community consensus to avoid conflicts with other protocols.</t>

</section>
<section anchor="ip-protocol-number-optionalfuture-use"><name>IP Protocol Number (Optional/Future Use)</name>

<t>Currently, DART packets are encapsulated within UDP and do not require a new IP protocol number. However, if in the future the community seeks to transport DART directly at the IP layer (e.g., as a new L3 protocol), a new IP protocol number may be requested from IANA.</t>

<t><list style="symbols">
  <t>Current Status: No new IP protocol number requested.</t>
  <t>Future Extensibility: Reserved as an option for future community-defined extensions.</t>
</list></t>

</section>
</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The DART protocol introduces a name-based addressing model and message encapsulation format. Its overall security depends on the integrity of the DNS system, the behavior of DART gateways, and the processing of DART packets. This section outlines potential security threats and preliminary mitigation strategies.</t>

<section anchor="risks-related-to-dns"><name>Risks Related to DNS</name>

<t>DART relies on DNS responses (particularly CNAME and A records) for address resolution and capability indication. This dependency exposes it to DNS-based attacks:</t>

<t><list style="symbols">
  <t>DNS spoofing / cache poisoning: An attacker may forge or manipulate DNS responses, tricking clients into sending DART messages to malicious gateways or hosts.</t>
</list></t>

<t>Mitigations:</t>

<t><list style="symbols">
  <t>Strongly recommend the use of DNSSEC to validate DNS response integrity <xref target="RFC4033"/><xref target="RFC4034"/><xref target="RFC4035"/>.</t>
  <t>DART clients should cache DNS results with appropriate TTLs to reduce exposure.</t>
  <t>DART gateways may maintain ACLs or whitelists to restrict valid destination domains.</t>
</list></t>

</section>
<section anchor="spoofing-or-abuse-of-virtual-addresses"><name>Spoofing or Abuse of Virtual Addresses</name>

<t>DART assigns virtual IP addresses to IPv4-only hosts to enable DART-based communication. Attackers might attempt to spoof or predict these mappings, potentially causing <xref target="RFC2827"/>:</t>

<t><list style="symbols">
  <t>Virtual address collisions,</t>
  <t>Misrouting of traffic to unintended hosts,</t>
  <t>DoS attacks leveraging forged virtual addresses.</t>
</list></t>

<t>Mitigations:</t>

<t><list style="symbols">
  <t>DART gateways must dynamically assign and manage virtual addresses, ensuring mappings are host-specific and not globally visible.</t>
  <t>Virtual addresses should be drawn from a private, controlled range (e.g., 198.18.0.0/15) to avoid conflicts with real-world addresses.</t>
  <t>Randomized address assignment can help reduce predictability.</t>
</list></t>

<t>Note: Since virtual address mapping is DNS-based, successful spoofing attempts would require DNS manipulation or MitM capabilities-equivalent to classic DNS attacks. Thus, deploying DNSSEC or encrypted DNS (e.g., DoT/DoH) is strongly recommended.</t>

</section>
<section anchor="injection-of-forged-dart-packets"><name>Injection of Forged DART Packets</name>

<t>Attackers may forge DART-encapsulated UDP packets with false headers in an attempt to manipulate gateway behavior or inject invalid traffic.</t>

<t>Mitigations:</t>

<t><list style="symbols">
  <t>DART gateways should validate source addresses and maintain ingress filtering.</t>
  <t>If deployed in untrusted environments, consider encapsulating DART traffic using IPsec <xref target="RFC4301"/>, QUIC, or similar secure transport layers.</t>
  <t>Gateways may apply basic rate-limiting and session-based admission control to mitigate abuse.</t>
</list></t>

</section>
<section anchor="inter-domain-route-spoofing"><name>Inter-Domain Route Spoofing</name>

<t>Because DART relies on domain-based interconnection paths, adversaries may register deceptive subdomains or craft malicious DNS entries to redirect traffic.</t>

<t>Mitigations:</t>

<t><list style="symbols">
  <t>Parent domain administrators should audit subdomain configurations.</t>
  <t>DNS zone administration must follow traditional best practices with access controls.</t>
  <t>DART deployments may benefit from introducing domain registration policies or a trust framework to validate subdomain authenticity.</t>
</list></t>

</section>
<section anchor="privacy-exposure-of-private-network-hosts"><name>Privacy Exposure of Private Network Hosts</name>

<t>In some environments, private network hosts using DART may include identifiable information (e.g., FQDNs) in outbound messages, potentially exposing user identities in sensitive contexts.</t>

<t>Mitigations:</t>

<t><list style="symbols">
  <t>DART gateways may be configured to obfuscate or replace source identity fields, acting as privacy-preserving proxies.</t>
  <t>Encrypted DNS (DoT/DoH) and encrypted transports (e.g., TLS, QUIC) are encouraged for protecting name resolution and message confidentiality.</t>
  <t>Gateways may implement firewalls or access controls based on domain, port, and identity attributes.</t>
  <t>Future work may explore anonymization or pseudonymization of DART headers to reduce traceability.</t>
</list></t>

<t>Design Philosophy Note:</t>

<t>DART aims to enable global end-to-end reachability, which inherently requires addressability and identity visibility. Unlike traditional NAT models that rely on obscurity for &quot;implicit security,&quot; DART adopts a transparent model with structured namespaces and policy-driven access control.</t>

<t>To be reachable is to be observable; to be connected is to be identifiable.</t>

<t>Security in DART is achieved through encryption, domain-level boundaries, and controllable access-not through concealment. The protocol encourages a shift from &quot;unreachability as security&quot; to &quot;policy-enforced security&quot; as a forward-looking paradigm.</t>

</section>
</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC1034">
  <front>
    <title>Domain names - concepts and facilities</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised basic definition of The Domain Name System. It obsoletes RFC-882. This memo describes the domain style names and their used for host address look up and electronic mail forwarding. It discusses the clients and servers in the domain name system and the protocol used between them.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1034"/>
  <seriesInfo name="DOI" value="10.17487/RFC1034"/>
</reference>

<reference anchor="RFC1035">
  <front>
    <title>Domain names - implementation and specification</title>
    <author fullname="P. Mockapetris" initials="P." surname="Mockapetris"/>
    <date month="November" year="1987"/>
    <abstract>
      <t>This RFC is the revised specification of the protocol and format used in the implementation of the Domain Name System. It obsoletes RFC-883. This memo documents the details of the domain name client - server communication.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="13"/>
  <seriesInfo name="RFC" value="1035"/>
  <seriesInfo name="DOI" value="10.17487/RFC1035"/>
</reference>

<reference anchor="RFC791">
  <front>
    <title>Internet Protocol</title>
    <author fullname="J. Postel" initials="J." surname="Postel"/>
    <date month="September" year="1981"/>
  </front>
  <seriesInfo name="STD" value="5"/>
  <seriesInfo name="RFC" value="791"/>
  <seriesInfo name="DOI" value="10.17487/RFC0791"/>
</reference>

<reference anchor="RFC8200">
  <front>
    <title>Internet Protocol, Version 6 (IPv6) Specification</title>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="86"/>
  <seriesInfo name="RFC" value="8200"/>
  <seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>

<reference anchor="RFC768">
  <front>
    <title>User Datagram Protocol</title>
    <author fullname="J. Postel" initials="J." surname="Postel"/>
    <date month="August" year="1980"/>
  </front>
  <seriesInfo name="STD" value="6"/>
  <seriesInfo name="RFC" value="768"/>
  <seriesInfo name="DOI" value="10.17487/RFC0768"/>
</reference>

<reference anchor="RFC2663">
  <front>
    <title>IP Network Address Translator (NAT) Terminology and Considerations</title>
    <author fullname="P. Srisuresh" initials="P." surname="Srisuresh"/>
    <author fullname="M. Holdrege" initials="M." surname="Holdrege"/>
    <date month="August" year="1999"/>
    <abstract>
      <t>This document attempts to describe the operation of NAT devices and the associated considerations in general, and to define the terminology used to identify various flavors of NAT. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2663"/>
  <seriesInfo name="DOI" value="10.17487/RFC2663"/>
</reference>

<reference anchor="RFC4787">
  <front>
    <title>Network Address Translation (NAT) Behavioral Requirements for Unicast UDP</title>
    <author fullname="F. Audet" initials="F." role="editor" surname="Audet"/>
    <author fullname="C. Jennings" initials="C." surname="Jennings"/>
    <date month="January" year="2007"/>
    <abstract>
      <t>This document defines basic terminology for describing different types of Network Address Translation (NAT) behavior when handling Unicast UDP and also defines a set of requirements that would allow many applications, such as multimedia communications or online gaming, to work consistently. Developing NATs that meet this set of requirements will greatly increase the likelihood that these applications will function properly. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="127"/>
  <seriesInfo name="RFC" value="4787"/>
  <seriesInfo name="DOI" value="10.17487/RFC4787"/>
</reference>

<reference anchor="RFC4271">
  <front>
    <title>A Border Gateway Protocol 4 (BGP-4)</title>
    <author fullname="Y. Rekhter" initials="Y." role="editor" surname="Rekhter"/>
    <author fullname="T. Li" initials="T." role="editor" surname="Li"/>
    <author fullname="S. Hares" initials="S." role="editor" surname="Hares"/>
    <date month="January" year="2006"/>
    <abstract>
      <t>This document discusses the Border Gateway Protocol (BGP), which is an inter-Autonomous System routing protocol.</t>
      <t>The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. This network reachability information includes information on the list of Autonomous Systems (ASes) that reachability information traverses. This information is sufficient for constructing a graph of AS connectivity for this reachability from which routing loops may be pruned, and, at the AS level, some policy decisions may be enforced.</t>
      <t>BGP-4 provides a set of mechanisms for supporting Classless Inter-Domain Routing (CIDR). These mechanisms include support for advertising a set of destinations as an IP prefix, and eliminating the concept of network "class" within BGP. BGP-4 also introduces mechanisms that allow aggregation of routes, including aggregation of AS paths.</t>
      <t>This document obsoletes RFC 1771. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4271"/>
  <seriesInfo name="DOI" value="10.17487/RFC4271"/>
</reference>

<reference anchor="RFC3022">
  <front>
    <title>Traditional IP Network Address Translator (Traditional NAT)</title>
    <author fullname="P. Srisuresh" initials="P." surname="Srisuresh"/>
    <author fullname="K. Egevang" initials="K." surname="Egevang"/>
    <date month="January" year="2001"/>
    <abstract>
      <t>The NAT operation described in this document extends address translation introduced in RFC 1631 and includes a new type of network address and TCP/UDP port translation. In addition, this document corrects the Checksum adjustment algorithm published in RFC 1631 and attempts to discuss NAT operation and limitations in detail. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3022"/>
  <seriesInfo name="DOI" value="10.17487/RFC3022"/>
</reference>

<reference anchor="RFC2181">
  <front>
    <title>Clarifications to the DNS Specification</title>
    <author fullname="R. Elz" initials="R." surname="Elz"/>
    <author fullname="R. Bush" initials="R." surname="Bush"/>
    <date month="July" year="1997"/>
    <abstract>
      <t>This document considers some areas that have been identified as problems with the specification of the Domain Name System, and proposes remedies for the defects identified. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2181"/>
  <seriesInfo name="DOI" value="10.17487/RFC2181"/>
</reference>

<reference anchor="RFC2328">
  <front>
    <title>OSPF Version 2</title>
    <author fullname="J. Moy" initials="J." surname="Moy"/>
    <date month="April" year="1998"/>
    <abstract>
      <t>This memo documents version 2 of the OSPF protocol. OSPF is a link- state routing protocol. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="54"/>
  <seriesInfo name="RFC" value="2328"/>
  <seriesInfo name="DOI" value="10.17487/RFC2328"/>
</reference>

<reference anchor="RFC5555">
  <front>
    <title>Mobile IPv6 Support for Dual Stack Hosts and Routers</title>
    <author fullname="H. Soliman" initials="H." role="editor" surname="Soliman"/>
    <date month="June" year="2009"/>
    <abstract>
      <t>The current Mobile IPv6 and Network Mobility (NEMO) specifications support IPv6 only. This specification extends those standards to allow the registration of IPv4 addresses and prefixes, respectively, and the transport of both IPv4 and IPv6 packets over the tunnel to the home agent. This specification also allows the mobile node to roam over both IPv6 and IPv4, including the case where Network Address Translation is present on the path between the mobile node and its home agent. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5555"/>
  <seriesInfo name="DOI" value="10.17487/RFC5555"/>
</reference>

<reference anchor="RFC8126">
  <front>
    <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
    <author fullname="M. Cotton" initials="M." surname="Cotton"/>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <date month="June" year="2017"/>
    <abstract>
      <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
      <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
      <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="26"/>
  <seriesInfo name="RFC" value="8126"/>
  <seriesInfo name="DOI" value="10.17487/RFC8126"/>
</reference>

<reference anchor="RFC4034">
  <front>
    <title>Resource Records for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4034"/>
  <seriesInfo name="DOI" value="10.17487/RFC4034"/>
</reference>

<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>

<reference anchor="RFC2827">
  <front>
    <title>Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing</title>
    <author fullname="P. Ferguson" initials="P." surname="Ferguson"/>
    <author fullname="D. Senie" initials="D." surname="Senie"/>
    <date month="May" year="2000"/>
    <abstract>
      <t>This paper discusses a simple, effective, and straightforward method for using ingress traffic filtering to prohibit DoS (Denial of Service) attacks which use forged IP addresses to be propagated from 'behind' an Internet Service Provider's (ISP) aggregation point. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="38"/>
  <seriesInfo name="RFC" value="2827"/>
  <seriesInfo name="DOI" value="10.17487/RFC2827"/>
</reference>

<reference anchor="RFC4301">
  <front>
    <title>Security Architecture for the Internet Protocol</title>
    <author fullname="S. Kent" initials="S." surname="Kent"/>
    <author fullname="K. Seo" initials="K." surname="Seo"/>
    <date month="December" year="2005"/>
    <abstract>
      <t>This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4301"/>
  <seriesInfo name="DOI" value="10.17487/RFC4301"/>
</reference>

<reference anchor="RFC2136">
  <front>
    <title>Dynamic Updates in the Domain Name System (DNS UPDATE)</title>
    <author fullname="P. Vixie" initials="P." role="editor" surname="Vixie"/>
    <author fullname="S. Thomson" initials="S." surname="Thomson"/>
    <author fullname="Y. Rekhter" initials="Y." surname="Rekhter"/>
    <author fullname="J. Bound" initials="J." surname="Bound"/>
    <date month="April" year="1997"/>
    <abstract>
      <t>Using this specification of the UPDATE opcode, it is possible to add or delete RRs or RRsets from a specified zone. Prerequisites are specified separately from update operations, and can specify a dependency upon either the previous existence or nonexistence of an RRset, or the existence of a single RR. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="2136"/>
  <seriesInfo name="DOI" value="10.17487/RFC2136"/>
</reference>

<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC4864">
  <front>
    <title>Local Network Protection for IPv6</title>
    <author fullname="G. Van de Velde" initials="G." surname="Van de Velde"/>
    <author fullname="T. Hain" initials="T." surname="Hain"/>
    <author fullname="R. Droms" initials="R." surname="Droms"/>
    <author fullname="B. Carpenter" initials="B." surname="Carpenter"/>
    <author fullname="E. Klein" initials="E." surname="Klein"/>
    <date month="May" year="2007"/>
    <abstract>
      <t>Although there are many perceived benefits to Network Address Translation (NAT), its primary benefit of "amplifying" available address space is not needed in IPv6. In addition to NAT's many serious disadvantages, there is a perception that other benefits exist, such as a variety of management and security attributes that could be useful for an Internet Protocol site. IPv6 was designed with the intention of making NAT unnecessary, and this document shows how Local Network Protection (LNP) using IPv6 can provide the same or more benefits without the need for address translation. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4864"/>
  <seriesInfo name="DOI" value="10.17487/RFC4864"/>
</reference>

<reference anchor="RFC8504">
  <front>
    <title>IPv6 Node Requirements</title>
    <author fullname="T. Chown" initials="T." surname="Chown"/>
    <author fullname="J. Loughney" initials="J." surname="Loughney"/>
    <author fullname="T. Winters" initials="T." surname="Winters"/>
    <date month="January" year="2019"/>
    <abstract>
      <t>This document defines requirements for IPv6 nodes. It is expected that IPv6 will be deployed in a wide range of devices and situations. Specifying the requirements for IPv6 nodes allows IPv6 to function well and interoperate in a large number of situations and deployments.</t>
      <t>This document obsoletes RFC 6434, and in turn RFC 4294.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="220"/>
  <seriesInfo name="RFC" value="8504"/>
  <seriesInfo name="DOI" value="10.17487/RFC8504"/>
</reference>

<reference anchor="RFC5128">
  <front>
    <title>State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs)</title>
    <author fullname="P. Srisuresh" initials="P." surname="Srisuresh"/>
    <author fullname="B. Ford" initials="B." surname="Ford"/>
    <author fullname="D. Kegel" initials="D." surname="Kegel"/>
    <date month="March" year="2008"/>
    <abstract>
      <t>This memo documents the various methods known to be in use by applications to establish direct communication in the presence of Network Address Translators (NATs) at the current time. Although this memo is intended to be mainly descriptive, the Security Considerations section makes some purely advisory recommendations about how to deal with security vulnerabilities the applications could inadvertently create when using the methods described. This memo covers NAT traversal approaches used by both TCP- and UDP-based applications. This memo is not an endorsement of the methods described, but merely an attempt to capture them in a document. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5128"/>
  <seriesInfo name="DOI" value="10.17487/RFC5128"/>
</reference>

<reference anchor="RFC4033">
  <front>
    <title>DNS Security Introduction and Requirements</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4033"/>
  <seriesInfo name="DOI" value="10.17487/RFC4033"/>
</reference>




    </references>

</references>


<?line 1067?>

<section anchor="example-deployment-topology"><name>Example Deployment Topology</name>

<section anchor="network-architecture"><name>Network Architecture</name>

<t>Assume the following network environment:</t>

<t><list style="symbols">
  <t>Top-level domain:<br />
dart.example, serving as the parent domain of two DART gateways. The parent domain interface IPs of gw1 and gw2 are 10.0.0.1 and 10.0.0.2, respectively.</t>
  <t>Subdomains:
  <list style="symbols">
      <t>sub1.dart.example (Subdomain 1), connected to DART gateway gw1. The interface IP of gw1 in this subdomain is 10.1.0.1.</t>
      <t>sub2.dart.example (Subdomain 2), connected to DART gateway gw2. The interface IP of gw2 in this subdomain is 10.2.0.1.</t>
    </list></t>
</list></t>

<t>The connection topology is as follows:</t>

<figure title="Example Deployment Topology" anchor="topology"><artwork><![CDATA[
            +-------------------------------------+
            |            dart.example             |
            |         (Parent DNS & Backbone)     |
            +-------------------------------------+
                    |                     |
              +-----v-----+         +-----v------+
              |    gw1    |         |    gw2     |
              | (DART GW) |         | (DART GW)  |
              +-----------+         +------------+
                    |                     |
        +-----------v-------+   +---------v----------+
        | sub1.dart.example |   | sub2.dart.example  |
        |  - A: IPv4-only   |   |  - C: DART Ready   |
        |  - B: DART Ready  |   |  - D: IPv4-only    |
        +-------------------+   +--------------------+
]]></artwork></figure>

<t><list style="symbols">
  <t>A: 10.1.0.11, IPv4-only</t>
  <t>B: 10.1.0.12, DART Ready</t>
  <t>C: 10.2.0.11, DART Ready</t>
  <t>D: 10.2.0.12, IPv4-only</t>
</list></t>

<t>Note: Since DART logically isolates IP address scopes across domains, the three domains above (one parent and two subdomains) may reuse the same IP subnets without collision. Different subnets are used here solely to avoid reader confusion.</t>

<t>In this deployment, gw1 and gw2 each integrate a DHCP server and a DNS server. These services must tightly integrate with the forwarding plane. If implemented as standalone servers, effective information sharing with the DART gateway is essential.</t>

</section>
<section anchor="procedures"><name>Procedures</name>

<t>Initialization (DHCP Phase)</t>

<t><list style="symbols">
  <t>Hosts A/B/C/D obtain IP addresses from their local DART gateway via DHCP.</t>
  <t>DART-ready hosts (B and C) include a special DHCP Option to indicate DART capability.</t>
  <t>DART-ready hosts also use the domain name provided by the DHCP server to construct their own FQDNs.</t>
  <t>IPv4-only hosts (A and D) are unaware of DART and join the network using legacy DHCP processes.</t>
  <t>During this phase, the DHCP server:
  <list style="symbols">
      <t>Allocates IPs, default gateways, and DNS servers;</t>
      <t>Records whether the host supports DART;</t>
      <t>Constructs FQDNs for IPv4-only hosts using their hostnames.</t>
    </list></t>
</list></t>

<t>DNS Resolution</t>

<t>Each gateway has an embedded DNS server with the following behavior:</t>

<t><list style="symbols">
  <t>For queries received via the parent domain interface:
  <list style="symbols">
      <t>Always respond with the gateway&#39;s parent domain IP, regardless of the actual destination. This forces the sender to route packets via the gateway.</t>
    </list></t>
  <t>For queries received via the subdomain interface:
  <list style="symbols">
      <t>If querying an in-domain host: respond with the actual IP of the target.</t>
      <t>If querying a host in another domain:
      <list style="symbols">
          <t>If the querier is DART-ready: respond with the gateway&#39;s subdomain interface IP, so the DART packet is sent via the local interface.</t>
          <t>If the querier is IPv4-only: allocate a virtual IP, bind it to the queried FQDN, and respond with this virtual IP. The IPv4-only host will send the packet to the virtual address, which routes to the gateway.</t>
        </list></t>
    </list></t>
</list></t>

<t>Forwarding</t>

<t><list style="symbols">
  <t>For DART packets arriving at the parent domain interface:
  <list style="symbols">
      <t>If the destination is a DART-ready host (B/C), forward via the corresponding subdomain interface.</t>
    </list></t>
  <t>For DART packets arriving at the subdomain interface (e.g., sent by B or C):
  <list style="symbols">
      <t>Forward via the parent domain interface.</t>
    </list></t>
  <t>In both cases:
  <list style="symbols">
      <t>DART header remains unchanged;</t>
      <t>IP header source and destination are rewritten appropriately.</t>
    </list></t>
</list></t>

<t>NAT-DART-4 Encapsulation (Sender Side)</t>

<t>Example: Host A (IPv4-only) sending to a host in sub2 (C or D):</t>

<t><list style="numbers" type="1">
  <t>A queries C.sub2.dart.example from its configured DNS server (10.1.0.1).</t>
  <t>The DNS server determines that C is external to the subdomain and:  <list style="symbols">
      <t>Allocates virtual address 198.18.1.34 and binds it to C.sub2.dart.example;</t>
      <t>Returns:<br />
 C.sub2.dart.example.      CNAME   dart-gateway.sub1.dart.example.
 dart-gateway.sub1.dart.example.  A 198.18.1.34</t>
    </list>
Although A is IPv4-only and ignores the CNAME, this prefix signals to operators that this is a DART-based mapping and 198.18.<em>.</em> is a virtual IP.</t>
  <t>A constructs an IP packet with destination 198.18.1.34 and sends it.</t>
  <t>The packet is routed to its default gateway gw1 (as the destination is non-local).</t>
  <t>At gw1, the following actions occur:  <list style="symbols">
      <t>Detects virtual IP as destination;</t>
      <t>Inserts DART header and UDP encapsulation;</t>
      <t>Fills in destination FQDN (C.sub2.dart.example) from DNS mapping;</t>
      <t>Determines source FQDN (A.sub1.dart.example) from DHCP records;</t>
      <t>Resolves C.sub2.dart.example via parent domain DNS to obtain 10.2.0.1;</t>
      <t>Sets source IP as 10.0.0.1 (gw1&#39;s parent interface);</t>
      <t>Sends encapsulated packet from parent interface.</t>
    </list></t>
  <t>The packet is routed via IP backbone and arrives at gw2&#39;s parent interface.</t>
  <t>gw2:  <list style="symbols">
      <t>Recognizes C as a DART-ready host;</t>
      <t>Rewrites the IP header (destination: 10.2.0.11, source: 10.2.0.1);</t>
      <t>Forwards the DART packet via its subdomain interface to C.</t>
    </list></t>
</list></t>

<t>NAT-DART-4 Decapsulation (Receiver Side)</t>

<t>Example: Host D (IPv4-only) receives a DART packet via gw2:</t>

<t><list style="numbers" type="1">
  <t>gw2 receives a DART packet from parent interface, destined for D.sub2.dart.example.</t>
  <t>Determines D is an IPv4-only host:
  <list style="symbols">
      <t>Allocates a virtual source address;</t>
      <t>Maps sender&#39;s FQDN to this virtual IP;</t>
      <t>Strips DART and UDP headers;</t>
      <t>Constructs a native IP packet:
      <list style="symbols">
          <t>Destination: D&#39;s IP 10.2.0.12</t>
          <t>Source: virtual address</t>
        </list></t>
      <t>Sends via subdomain interface.</t>
    </list></t>
  <t>D receives the packet and replies to the virtual source IP.</t>
  <t>gw2 re-encapsulates the reply using the same virtual-IP-to-FQDN mapping.</t>
  <t>The response is routed back to the original sender through the DART infrastructure.</t>
</list></t>

</section>
<section anchor="case-walkthrough"><name>Case Walkthrough</name>
<t>Let host A (A.sub1.dart.example, 10.1.0.11, IPv4-only) send a message to host C (C.sub2.dart.example, 10.2.0.11, DART Ready):</t>

<t><list style="numbers" type="1">
  <t>A queries C.sub2.dart.example via DNS.</t>
  <t>DNS server returns:  <vspace blankLines='1'/>
C.sub2.dart.example.      CNAME   dart-gateway.sub1.dart.example.
 dart-gateway.sub1.dart.example.  A 198.18.1.34</t>
  <t>A sends packet to 198.18.1.34, which is routed to gw1.</t>
  <t>gw1 detects virtual destination:  <list style="symbols">
      <t>Builds DART header with source FQDN A.sub1.dart.example and destination FQDN C.sub2.dart.example;</t>
      <t>Looks up IP 10.2.0.1 for destination;</t>
      <t>Sends encapsulated DART packet from 10.0.0.1.</t>
    </list></t>
  <t>Packet is delivered to gw2.</t>
  <t>gw2 finds that destination C is DART-ready:
  <list style="symbols">
      <t>Forwards DART packet to 10.2.0.11 from 10.2.0.1.</t>
    </list></t>
</list></t>

</section>
<section anchor="summary-1"><name>Summary</name>
<t>This example illustrates a multi-subdomain, mixed-host environment and highlights:</t>

<t><list style="symbols">
  <t>DNS-driven forwarding behavior;</t>
  <t>Role of virtual addresses in enabling IPv4-only interoperability;</t>
  <t>Encapsulation and decapsulation by DART gateways;</t>
  <t>Cross-domain communication between legacy and DART-ready nodes.</t>
</list></t>

</section>
</section>
<section anchor="acknowledgements"><name>Acknowledgements</name>

<t>The author, Li Shi, is solely responsible for the design and implementation of the DART protocol at the current stage.</t>

<t>During the drafting of this document, the author received valuable support from modern AI-assisted tools, including ChatGPT, DeepSeek, Tongyilingma and GitHub Copilot. These tools played a helpful role in shaping the structure, clarifying concepts, and accelerating document generation.</t>

<t>The author also thanks the IETF community and its working groups for providing an open platform for the development and discussion of new protocols.</t>

<t>Constructive feedback from future reviewers is sincerely appreciated.</t>

</section>
<section anchor="implementation-and-availability"><name>Implementation and Availability</name>

<t>A working prototype of the DART protocol has been independently developed and deployed by the author. It is publicly accessible at<br />
http://dart-proto.cn</t>

<t>This live system demonstrates the core features of the DART protocol, including DNS-based FQDN redirection, virtual address mapping, DART encapsulation and routing, and NAT-DART-4 conversion.</t>

<t>The source code of the implementation is fully open-source and available on GitHub at the following repositories:</t>

<t><list style="symbols">
  <t>DART Gateway (Linux-based)<br />
https://github.com/rancho-dart/dart_forwarder</t>
  <t>DART-ready client for Windows (based on WinDivert)<br />
https://github.com/rancho-dart/DartWinDivert</t>
</list></t>

<t>The author encourages implementers, researchers, and operators to experiment with the live system, review the source code, and provide feedback to improve the protocol.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

